Bug 90531 - [PATCH] security/dropbear: update to 0.47
Summary: [PATCH] security/dropbear: update to 0.47
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Clement Laforet
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-12-17 08:00 UTC by gslin
Modified: 2005-12-19 09:21 UTC (History)
1 user (show)

See Also:


Attachments
dropbear-0.47.patch (962 bytes, patch)
2005-12-17 08:00 UTC, gslin
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description gslin 2005-12-17 08:00:13 UTC
- Dropbear server versions prior to 0.47 have a buffer sizing error
  that may allow authenticated users to run code as the server user
  (usually root).
- Add SHA256.

Port maintainer (clement@FreeBSD.org) is cc'd.

Generated with FreeBSD Port Tools 0.63
Comment 1 Erwin Lansing freebsd_committer freebsd_triage 2005-12-17 10:15:43 UTC
Responsible Changed
From-To: freebsd-ports-bugs->clement

Over to maintainer.
Comment 2 Clement Laforet freebsd_committer freebsd_triage 2005-12-19 09:20:57 UTC
State Changed
From-To: open->closed

Committed, thanks! 
Sorry for the delay but tarball was unfetchable.