summaryrefslogtreecommitdiff
path: root/security/putty/patches
diff options
context:
space:
mode:
authorryoon <ryoon@pkgsrc.org>2015-04-08 18:45:21 +0000
committerryoon <ryoon@pkgsrc.org>2015-04-08 18:45:21 +0000
commit7e38b3cdc22bfb5787fd8ee2bab6ce357cc5d727 (patch)
tree2b2bc07d11bc776c2e205358b5a04efc9ab3a6f1 /security/putty/patches
parentfb686989d9e0824c479dc8bb8c070ee39b93e9a0 (diff)
downloadpkgsrc-7e38b3cdc22bfb5787fd8ee2bab6ce357cc5d727.tar.gz
Update to 0.64
* Avoid compilation error on tolower and char type. Changelog: 2015-02-28 PuTTY 0.64 released, fixing a SECURITY HOLE PuTTY 0.64, released today, fixes a security hole in 0.63 and before: private-key-not-wiped-2. Also diffie-hellman-range-check has been argued to be a security hole. In addition to these and other less critical bug fixes, 0.64 also supports the major new feature of sharing an SSH connection between multiple instances of PuTTY and its tools, and a command-line and config option to specify the expected host key(s).
Diffstat (limited to 'security/putty/patches')
-rw-r--r--security/putty/patches/patch-misc.c13
1 files changed, 13 insertions, 0 deletions
diff --git a/security/putty/patches/patch-misc.c b/security/putty/patches/patch-misc.c
new file mode 100644
index 00000000000..0d972369e46
--- /dev/null
+++ b/security/putty/patches/patch-misc.c
@@ -0,0 +1,13 @@
+$NetBSD: patch-misc.c,v 1.1 2015/04/08 18:45:22 ryoon Exp $
+
+--- misc.c.orig 2015-02-28 15:33:27.000000000 +0000
++++ misc.c
+@@ -964,7 +964,7 @@ int validate_manual_hostkey(char *key)
+ if (q[3*i+2] != ':')
+ goto not_fingerprint; /* sorry */
+ for (i = 0; i < 16*3 - 1; i++)
+- key[i] = tolower(q[i]);
++ key[i] = tolower((unsigned char)(q[i]));
+ key[16*3 - 1] = '\0';
+ return TRUE;
+ }