Bug 90813 - [Maintainer update] shells/scponly: Update to 4.2 (with security fixes)
Summary: [Maintainer update] shells/scponly: Update to 4.2 (with security fixes)
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Renato Botelho
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-12-22 15:40 UTC by Hideyuki KURASHINA
Modified: 2005-12-23 09:34 UTC (History)
0 users

See Also:


Attachments
file.diff (3.21 KB, patch)
2005-12-22 15:40 UTC, Hideyuki KURASHINA
no flags Details | Diff
file.diff (2.47 KB, patch)
2005-12-22 15:40 UTC, Hideyuki KURASHINA
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Hideyuki KURASHINA freebsd_committer freebsd_triage 2005-12-22 15:40:03 UTC
	o Update to 4.2.
	  - Security fixes (local privilege escalation exploits).  See
            https://lists.ccs.neu.edu/pipermail/scponly/2005-December/001027.html
            for details.
	  - The scp and WinSCP compatibilities are turned off by default
	    to improve scp argument processing.
          - The sftp-logging supported.
	  - Etc.
	o Add SHA256 hash.
	o Put relevant entry into vuln.xml

Fix: Apply following patch,

How-To-Repeat: 
	Refer
	  
	  http://www.sublimation.org/scponly/
Comment 1 Renato Botelho freebsd_committer freebsd_triage 2005-12-22 16:03:20 UTC
Responsible Changed
From-To: freebsd-ports-bugs->garga

I'll take it.
Comment 2 Renato Botelho freebsd_committer freebsd_triage 2005-12-23 09:34:17 UTC
State Changed
From-To: open->closed

Committed. Thanks!