package/openssh: security bump to version 8.4p1
authorChristian Stewart <christian@paral.in>
Mon, 1 Mar 2021 11:59:03 +0000 (03:59 -0800)
committerPeter Korsgaard <peter@korsgaard.com>
Mon, 1 Mar 2021 16:07:30 +0000 (17:07 +0100)
commit6609cd0d8894771126cd82d95deb10180cb6cf41
tree452fc38ca1a6f03e9b3b2c1d62b62862f4223ce1
parentdfd44046f36edee3bfd48aa4336d0b9b9baf90d4
package/openssh: security bump to version 8.4p1

Fixes CVE-2020-15778: scp in OpenSSH through 8.3p1 allows command injection in
the scp.c toremote function, as demonstrated by backtick characters in the
destination argument. NOTE: the vendor reportedly has stated that they
intentionally omit validation of "anomalous argument transfers" because that
could "stand a great chance of breaking existing workflows."

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15778

Signed-off-by: Christian Stewart <christian@paral.in>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/openssh/openssh.hash
package/openssh/openssh.mk