diff mbox series

openssh: security bump to version 7.6p1

Message ID 20171026125247.1044-1-peter@korsgaard.com
State Accepted
Commit 70663a9a4fcb9211fcef7668a8a35de11cc54775
Headers show
Series openssh: security bump to version 7.6p1 | expand

Commit Message

Peter Korsgaard Oct. 26, 2017, 12:52 p.m. UTC
Fixes CVE-2017-15906 - The process_open function in sftp-server.c in OpenSSH
before 7.6 does not properly prevent write operations in readonly mode,
which allows attackers to create zero-length files.

For more details, see the release notes:
https://www.openssh.com/txt/release-7.6

Also add a hash for the license file while we're at it.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
 package/openssh/openssh.hash | 6 ++++--
 package/openssh/openssh.mk   | 2 +-
 2 files changed, 5 insertions(+), 3 deletions(-)

Comments

Peter Korsgaard Oct. 27, 2017, 11:49 a.m. UTC | #1
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes CVE-2017-15906 - The process_open function in sftp-server.c in OpenSSH
 > before 7.6 does not properly prevent write operations in readonly mode,
 > which allows attackers to create zero-length files.

 > For more details, see the release notes:
 > https://www.openssh.com/txt/release-7.6

 > Also add a hash for the license file while we're at it.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed, thanks.
Peter Korsgaard Oct. 28, 2017, 5:49 p.m. UTC | #2
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes CVE-2017-15906 - The process_open function in sftp-server.c in OpenSSH
 > before 7.6 does not properly prevent write operations in readonly mode,
 > which allows attackers to create zero-length files.

 > For more details, see the release notes:
 > https://www.openssh.com/txt/release-7.6

 > Also add a hash for the license file while we're at it.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2017.02.x, thanks.
Peter Korsgaard Nov. 15, 2017, 6:54 p.m. UTC | #3
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes CVE-2017-15906 - The process_open function in sftp-server.c in OpenSSH
 > before 7.6 does not properly prevent write operations in readonly mode,
 > which allows attackers to create zero-length files.

 > For more details, see the release notes:
 > https://www.openssh.com/txt/release-7.6

 > Also add a hash for the license file while we're at it.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2017.08.x, thanks.
diff mbox series

Patch

diff --git a/package/openssh/openssh.hash b/package/openssh/openssh.hash
index 3685bc0dbf..d8a4da32ad 100644
--- a/package/openssh/openssh.hash
+++ b/package/openssh/openssh.hash
@@ -1,2 +1,4 @@ 
-# From http://www.openssh.com/txt/release-7.5 (base64 encoded)
-sha256 9846e3c5fab9f0547400b4d2c017992f914222b3fd1f8eee6c7dc6bc5e59f9f0  openssh-7.5p1.tar.gz
+# From http://www.openssh.com/txt/release-7.6 (base64 encoded)
+sha256 a323caeeddfe145baaa0db16e98d784b1fbc7dd436a6bf1f479dfd5cd1d21723  openssh-7.6p1.tar.gz
+# Locally calculated
+sha256 05a4c25ef464e19656c5259bd4f4da8428efab01044f3541b79fbb3ff209350f  LICENCE
diff --git a/package/openssh/openssh.mk b/package/openssh/openssh.mk
index 38a32bf54d..6b7ac22c19 100644
--- a/package/openssh/openssh.mk
+++ b/package/openssh/openssh.mk
@@ -4,7 +4,7 @@ 
 #
 ################################################################################
 
-OPENSSH_VERSION = 7.5p1
+OPENSSH_VERSION = 7.6p1
 OPENSSH_SITE = http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable
 OPENSSH_LICENSE = BSD-3-Clause, BSD-2-Clause, Public Domain
 OPENSSH_LICENSE_FILES = LICENCE