commit bad843ee1ce052e9b051e792ab13654f903e3094 from: djm date: Mon Jul 01 08:25:34 2024 UTC regen commit - 732df05d68f042036fc4dd0cf21e0054f6c461b5 commit + bad843ee1ce052e9b051e792ab13654f903e3094 blob - fc591d9a802da784c1e81017f6ef0bb7f76c634f blob + 2310c9b1384d1b4a5042a30e244aa35af4e8fad9 --- build/openssh/releases.pl +++ build/openssh/releases.pl @@ -90,7 +90,6 @@ my %date_override = ( '3.8.1p1' => '2004-04-19', '3.9' => '2004-08-18', '4.0' => '2005-03-09', - '9.8' => '2024-07-01', ); my %releases; blob - 86d41f8f4bf414aff366afc230245a07623ff9ad blob + 957fdb11c616f169a6276542b45d825e0e94c309 --- openssh/releasenotes.html +++ openssh/releasenotes.html @@ -44,8 +44,8 @@ and one minor. 1) Race condition in sshd(8) A critical vulnerability in sshd(8) was present in Portable OpenSSH -versions 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code -execution with root privileges. +versions between 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary +code execution with root privileges. Successful exploitation has been demonstrated on 32-bit Linux/glibc systems with ASLR. Under lab conditions, the attack requires on @@ -12562,4 +12562,4 @@ Damien Miller [1] http://violet.ibs.com.au/openssh/files/ChangeLog
-

$OpenBSD: releasenotes.html,v 1.70 2024/07/01 07:57:15 djm Exp $ +

$OpenBSD: releasenotes.html,v 1.71 2024/07/01 08:25:35 djm Exp $