openssh: security bump to version 7.4p1
authorGustavo Zacarias <gustavo@zacarias.com.ar>
Mon, 19 Dec 2016 16:27:51 +0000 (13:27 -0300)
committerPeter Korsgaard <peter@korsgaard.com>
Mon, 19 Dec 2016 19:53:24 +0000 (20:53 +0100)
commitae58da71111c9a9825fa8dab1338831ff38dc320
tree66948ccd275d5c74888d85be652a498b7c3961a7
parent42081de819611eeee889eb0c974556c6e5e25322
openssh: security bump to version 7.4p1

Fixes:
CVE-2016-10009 - ssh-agent(1): Will now refuse to load PKCS#11 modules
from paths outside a trusted whitelist
CVE-2016-10010 - sshd(8): When privilege separation is disabled,
forwarded Unix-domain sockets would be created by sshd(8) with the
privileges of 'root'
CVE-2016-10011 - sshd(8): Avoid theoretical leak of host private key
material to privilege-separated child processes via realloc()
CVE-2016-10012 - sshd(8): The shared memory manager used by
pre-authentication compression support had a bounds checks that could be
elided by some optimising compilers

http://seclists.org/oss-sec/2016/q4/708

Drop upstream patch.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/openssh/0003-fix-CVE-2016-8858.patch [deleted file]
package/openssh/openssh.hash
package/openssh/openssh.mk