openssh: security bump to version 7.1p2
Fixes: CVE-2016-0777 - Client Information leak from use of roaming connection feature. CVE-2016-0778 - A buffer overflow flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to execute arbitrary code on a successfully authenticated OpenSSH client if that client used certain non-default configuration options. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Reviewed-by: James Knight <james.knight@rockwellcollins.com> Tested-by: James Knight <james.knight@rockwellcollins.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
parent
12009bb929
commit
2ff0e32e25
@ -1,4 +1,3 @@
|
||||
# Locally calculated after checking pgp signature
|
||||
# Also from http://www.openssh.com/txt/release-7.1 (sha256 is base64 encoded)
|
||||
# Decode with -> echo <encoded stuff>|base64 -d|hexdump -v -e '/1 "%02x"'
|
||||
sha256 fc0a6d2d1d063d5c66dffd952493d0cda256cad204f681de0f84ef85b2ad8428 openssh-7.1p1.tar.gz
|
||||
# Also from http://www.openssh.com/txt/release-7.1p2
|
||||
sha256 dd75f024dcf21e06a0d6421d582690bf987a1f6323e32ad6619392f3bfde6bbd openssh-7.1p2.tar.gz
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
OPENSSH_VERSION = 7.1p1
|
||||
OPENSSH_VERSION = 7.1p2
|
||||
OPENSSH_SITE = http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable
|
||||
OPENSSH_LICENSE = BSD-3c BSD-2c Public Domain
|
||||
OPENSSH_LICENSE_FILES = LICENCE
|
||||
|
Loading…
Reference in New Issue
Block a user