Commit Diff


commit - 732df05d68f042036fc4dd0cf21e0054f6c461b5
commit + bad843ee1ce052e9b051e792ab13654f903e3094
blob - fc591d9a802da784c1e81017f6ef0bb7f76c634f
blob + 2310c9b1384d1b4a5042a30e244aa35af4e8fad9
--- build/openssh/releases.pl
+++ build/openssh/releases.pl
@@ -90,7 +90,6 @@ my %date_override = (
 	'3.8.1p1'	=> '2004-04-19',
 	'3.9'		=> '2004-08-18',
 	'4.0'		=> '2005-03-09',
-	'9.8'		=> '2024-07-01',
 );
 
 my %releases;
blob - 86d41f8f4bf414aff366afc230245a07623ff9ad
blob + 957fdb11c616f169a6276542b45d825e0e94c309
--- openssh/releasenotes.html
+++ openssh/releasenotes.html
@@ -44,8 +44,8 @@ and one minor.
 1) Race condition in <a href='https://man.openbsd.org/sshd.8'>sshd(8)</a>
 
 A critical vulnerability in <a href='https://man.openbsd.org/sshd.8'>sshd(8)</a> was present in Portable OpenSSH
-versions 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code
-execution with root privileges.
+versions between 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary
+code execution with root privileges.
 
 Successful exploitation has been demonstrated on 32-bit Linux/glibc
 systems with ASLR. Under lab conditions, the attack requires on
@@ -12562,4 +12562,4 @@ Damien Miller
 
 [1] <a href='http://violet.ibs.com.au/openssh/files/ChangeLog'>http://violet.ibs.com.au/openssh/files/ChangeLog</a>
 </pre><hr>
-<p>$OpenBSD: releasenotes.html,v 1.70 2024/07/01 07:57:15 djm Exp $
+<p>$OpenBSD: releasenotes.html,v 1.71 2024/07/01 08:25:35 djm Exp $