Update to 0.57:
PuTTY 0.57, released today, fixes two security holes which can allow a malicious SFTP server to execute code of its choice on a PSCP or PSFTP client connecting to it. We recommend everybody upgrade to 0.57 as soon as possible.
This commit is contained in:
parent
b4228a464e
commit
07d62ffe48
2 changed files with 6 additions and 6 deletions
|
@ -1,7 +1,7 @@
|
|||
# $NetBSD: Makefile,v 1.1.1.1 2004/10/29 23:00:30 xtraeme Exp $
|
||||
# $NetBSD: Makefile,v 1.2 2005/03/29 14:40:09 wiz Exp $
|
||||
#
|
||||
|
||||
DISTNAME= putty-0.56
|
||||
DISTNAME= putty-0.57
|
||||
CATEGORIES= security
|
||||
MASTER_SITES= http://the.earth.li/~sgtatham/putty/latest/
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
$NetBSD: distinfo,v 1.2 2005/02/24 13:10:12 agc Exp $
|
||||
$NetBSD: distinfo,v 1.3 2005/03/29 14:40:09 wiz Exp $
|
||||
|
||||
SHA1 (putty-0.56.tar.gz) = 5ab52f9ebf90577f708fc90650e7b54e6ef9120e
|
||||
RMD160 (putty-0.56.tar.gz) = b4a99bc41558aaa14c2c3662177bc3dfcb4c0760
|
||||
Size (putty-0.56.tar.gz) = 1307512 bytes
|
||||
SHA1 (putty-0.57.tar.gz) = 006e336c9c5a77538f22f545c38ca2afb0dd46e9
|
||||
RMD160 (putty-0.57.tar.gz) = c44e61b6fb8899ab2a6f2ee6f265085281eb866b
|
||||
Size (putty-0.57.tar.gz) = 1319513 bytes
|
||||
SHA1 (patch-aa) = 843dd63165d715ca7e6c3c4b573d9e5d560beae1
|
||||
SHA1 (patch-ab) = a96d4630fc8a74dd373fa66c3665ab17f6290797
|
||||
|
|
Loading…
Reference in a new issue