openssh: security bump to version 7.1p2

Fixes:

CVE-2016-0777 - Client Information leak from use of roaming connection
feature.

CVE-2016-0778 - A buffer overflow flaw was found in the way the OpenSSH
client roaming feature was implemented. A malicious server could
potentially use this flaw to execute arbitrary code on a successfully
authenticated OpenSSH client if that client used certain non-default
configuration options.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Reviewed-by: James Knight <james.knight@rockwellcollins.com>
Tested-by: James Knight <james.knight@rockwellcollins.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
Gustavo Zacarias 2016-01-14 14:55:43 -03:00 committed by Peter Korsgaard
parent 12009bb929
commit 2ff0e32e25
2 changed files with 3 additions and 4 deletions

View File

@ -1,4 +1,3 @@
# Locally calculated after checking pgp signature
# Also from http://www.openssh.com/txt/release-7.1 (sha256 is base64 encoded)
# Decode with -> echo <encoded stuff>|base64 -d|hexdump -v -e '/1 "%02x"'
sha256 fc0a6d2d1d063d5c66dffd952493d0cda256cad204f681de0f84ef85b2ad8428 openssh-7.1p1.tar.gz
# Also from http://www.openssh.com/txt/release-7.1p2
sha256 dd75f024dcf21e06a0d6421d582690bf987a1f6323e32ad6619392f3bfde6bbd openssh-7.1p2.tar.gz

View File

@ -4,7 +4,7 @@
#
################################################################################
OPENSSH_VERSION = 7.1p1
OPENSSH_VERSION = 7.1p2
OPENSSH_SITE = http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable
OPENSSH_LICENSE = BSD-3c BSD-2c Public Domain
OPENSSH_LICENSE_FILES = LICENCE