openssh: security bump to version 7.1p2
authorGustavo Zacarias <gustavo@zacarias.com.ar>
Thu, 14 Jan 2016 17:55:43 +0000 (14:55 -0300)
committerPeter Korsgaard <peter@korsgaard.com>
Thu, 14 Jan 2016 19:13:57 +0000 (20:13 +0100)
commit2ff0e32e254e3ee6d96f6b13b7bf182b4e1def73
tree202d946cdc65148c3d2d664a5b435265e8bfaff1
parent12009bb92931b153823110f811632540044d3b02
openssh: security bump to version 7.1p2

Fixes:

CVE-2016-0777 - Client Information leak from use of roaming connection
feature.

CVE-2016-0778 - A buffer overflow flaw was found in the way the OpenSSH
client roaming feature was implemented. A malicious server could
potentially use this flaw to execute arbitrary code on a successfully
authenticated OpenSSH client if that client used certain non-default
configuration options.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Reviewed-by: James Knight <james.knight@rockwellcollins.com>
Tested-by: James Knight <james.knight@rockwellcollins.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/openssh/openssh.hash
package/openssh/openssh.mk