aboutsummaryrefslogtreecommitdiffstats
path: root/security/dropbear
diff options
context:
space:
mode:
authorpawel <pawel@FreeBSD.org>2016-08-02 01:43:19 +0800
committerpawel <pawel@FreeBSD.org>2016-08-02 01:43:19 +0800
commit18b6599eb7d0409f2fbb8e1fcfb80a5c75c764c1 (patch)
tree8ec00d7f062947f42f5f734b17cb54014d77048b /security/dropbear
parent7c8e2a01dcbf24f9aed29c4e2efb778a8be952b6 (diff)
downloadfreebsd-ports-gnome-18b6599eb7d0409f2fbb8e1fcfb80a5c75c764c1.tar.gz
freebsd-ports-gnome-18b6599eb7d0409f2fbb8e1fcfb80a5c75c764c1.tar.zst
freebsd-ports-gnome-18b6599eb7d0409f2fbb8e1fcfb80a5c75c764c1.zip
- Update to version 2016.74
- Add license information Changelog: - Security: Message printout was vulnerable to format string injection. If specific usernames including "%" symbols can be created on a system (validated by getpwnam()) then an attacker could run arbitrary code as root when connecting to Dropbear server. A dbclient user who can control username or host arguments could potentially run arbitrary code as the dbclient user. This could be a problem if scripts or webpages pass untrusted input to the dbclient program. - Security: dropbearconvert import of OpenSSH keys could run arbitrary code as the local dropbearconvert user when parsing malicious key files - Security: dbclient could run arbitrary code as the local dbclient user if particular -m or -c arguments are provided. This could be an issue where dbclient is used in scripts. - Security: dbclient or dropbear server could expose process memory to the running user if compiled with DEBUG_TRACE and running with -v PR: 211298 Submitted by: Piotr Kubaj (maintainer) MFH: 2016Q3
Diffstat (limited to 'security/dropbear')
-rw-r--r--security/dropbear/Makefile5
-rw-r--r--security/dropbear/distinfo5
2 files changed, 7 insertions, 3 deletions
diff --git a/security/dropbear/Makefile b/security/dropbear/Makefile
index ed89df1b9b14..323dc0b70ed0 100644
--- a/security/dropbear/Makefile
+++ b/security/dropbear/Makefile
@@ -2,13 +2,16 @@
# $FreeBSD$
PORTNAME= dropbear
-PORTVERSION= 2016.73
+PORTVERSION= 2016.74
CATEGORIES= security ipv6
MASTER_SITES= http://matt.ucc.asn.au/dropbear/releases/
MAINTAINER= pkubaj@anongoth.pl
COMMENT= SSH 2 server, designed to be usable in small memory environments
+LICENSE= MIT
+LICENSE_FILE= ${WRKSRC}/LICENSE
+
GNU_CONFIGURE= yes
USES= cpe gmake tar:bzip2
CPE_VENDOR= matt_johnston
diff --git a/security/dropbear/distinfo b/security/dropbear/distinfo
index 7de4535e4e99..422b513fd65d 100644
--- a/security/dropbear/distinfo
+++ b/security/dropbear/distinfo
@@ -1,2 +1,3 @@
-SHA256 (dropbear-2016.73.tar.bz2) = 5c61a4f69b093b688629cd365be38701485ff63cfb23642dab7a05ad250aefd7
-SIZE (dropbear-2016.73.tar.bz2) = 1621584
+TIMESTAMP = 1469201269
+SHA256 (dropbear-2016.74.tar.bz2) = 2720ea54ed009af812701bcc290a2a601d5c107d12993e5d92c0f5f81f718891
+SIZE (dropbear-2016.74.tar.bz2) = 1622234