bd6fa8d13b
The only change between 0.80 and 0.81 is one security fix: - ECDSA signatures using 521-bit keys (the NIST P521 curve, otherwise known as ecdsa-sha2-nistp521) were generated with biased random numbers. This permits an attacker in possession of a few dozen signatures to RECOVER THE PRIVATE KEY. Any 521-bit ECDSA private key that PuTTY or Pageant has used to sign anything should be considered compromised. This vulnerability has the identifier CVE-2024-31497. Update hash of LICENCE file (update in year with https://git.tartarus.org/?p=simon/putty.git;a=commit;h=f2f28ac0386eebbd45ea605818d31d62d219f589) https://lists.tartarus.org/pipermail/putty-announce/2024/000038.html Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
26 lines
673 B
Makefile
26 lines
673 B
Makefile
################################################################################
|
|
#
|
|
# putty
|
|
#
|
|
################################################################################
|
|
|
|
PUTTY_VERSION = 0.81
|
|
PUTTY_SITE = http://the.earth.li/~sgtatham/putty/$(PUTTY_VERSION)
|
|
PUTTY_LICENSE = MIT
|
|
PUTTY_LICENSE_FILES = LICENCE
|
|
PUTTY_CPE_ID_VENDOR = putty
|
|
PUTTY_DEPENDENCIES = host-pkgconf
|
|
PUTTY_CONF_OPTS = -DPUTTY_GSSAPI=OFF
|
|
|
|
ifeq ($(BR2_PACKAGE_LIBGTK3),y)
|
|
PUTTY_DEPENDENCIES += libgtk3
|
|
else ifeq ($(BR2_PACKAGE_LIBGTK2),y)
|
|
PUTTY_DEPENDENCIES += libgtk2
|
|
endif
|
|
|
|
ifeq ($(BR2_STATIC_LIBS),y)
|
|
PUTTY_CONF_OPTS += -DCMAKE_C_FLAGS="$(TARGET_CFLAGS) -DNO_LIBDL"
|
|
endif
|
|
|
|
$(eval $(cmake-package))
|