Received: from mail.netbsd.org (mail.netbsd.org [149.20.53.66]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "mail.NetBSD.org", Issuer "Postmaster NetBSD.org" (verified OK)) by mollari.NetBSD.org (Postfix) with ESMTPS id C20687086B for ; Wed, 7 Aug 2013 11:06:43 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id 0A7EA14A1B1; Wed, 7 Aug 2013 11:06:43 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id D347714A19A for ; Wed, 7 Aug 2013 11:06:40 +0000 (UTC) X-Virus-Scanned: amavisd-new at NetBSD.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id oItteAdborSv for ; Wed, 7 Aug 2013 11:06:40 +0000 (UTC) Received: from cvs.netbsd.org (cvs.NetBSD.org [IPv6:2001:4f8:3:7:2e0:81ff:fe30:95bd]) by mail.netbsd.org (Postfix) with ESMTP id 1BBD714A195 for ; Wed, 7 Aug 2013 11:06:40 +0000 (UTC) Received: by cvs.netbsd.org (Postfix, from userid 500) id DD88596; Wed, 7 Aug 2013 11:06:39 +0000 (UTC) Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" MIME-Version: 1.0 Date: Wed, 7 Aug 2013 11:06:39 +0000 From: "Matthias Drochner" Subject: CVS commit: pkgsrc/security/putty To: pkgsrc-changes@NetBSD.org Reply-To: drochner@netbsd.org X-Mailer: log_accum Message-Id: <20130807110639.DD88596@cvs.netbsd.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: pkgsrc-changes.NetBSD.org Precedence: bulk Module Name: pkgsrc Committed By: drochner Date: Wed Aug 7 11:06:39 UTC 2013 Modified Files: pkgsrc/security/putty: Makefile distinfo pkgsrc/security/putty/patches: patch-import.c patch-timing.c patch-unix_gtkwin.c patch-unix_uxnet.c patch-unix_uxucs.c patch-windows_window.c Removed Files: pkgsrc/security/putty/patches: patch-CVE-2013-4852-1 patch-CVE-2013-4852-2 patch-terminal.c patch-unix_gtkfont_c Log Message: update to 0.63 This fixes a buffer overflow which was patched in pkgsrc (CVE-2013-4852), two other buffer overflows (CVE-2013-4206, CVE-2013-4207), and it clears private keys after use now (CVE-2013-4208). Other than that, there are mostly bug fixes from 0.62 and a few small features. To generate a diff of this commit: cvs rdiff -u -r1.34 -r1.35 pkgsrc/security/putty/Makefile cvs rdiff -u -r1.14 -r1.15 pkgsrc/security/putty/distinfo cvs rdiff -u -r1.1 -r0 pkgsrc/security/putty/patches/patch-CVE-2013-4852-1 \ pkgsrc/security/putty/patches/patch-CVE-2013-4852-2 \ pkgsrc/security/putty/patches/patch-unix_gtkfont_c cvs rdiff -u -r1.2 -r1.3 pkgsrc/security/putty/patches/patch-import.c \ pkgsrc/security/putty/patches/patch-unix_gtkwin.c cvs rdiff -u -r1.2 -r0 pkgsrc/security/putty/patches/patch-terminal.c cvs rdiff -u -r1.1 -r1.2 pkgsrc/security/putty/patches/patch-timing.c \ pkgsrc/security/putty/patches/patch-unix_uxnet.c \ pkgsrc/security/putty/patches/patch-unix_uxucs.c \ pkgsrc/security/putty/patches/patch-windows_window.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.