Thanks, applied as b233b1d1b1ba46c691d410cf17acd67c785dc226. Michael
[sent from post-receive hook] On Tue, 01 Aug 2023 09:48:54 +0200, Christian Melki <christian.me...@t2data.com> wrote: > Patchlevel release to fix CVE. > https://www.openssh.com/txt/release-9.3p2 > > CVE-2023-38408 - Remote exec in ssh-agent PKCS#11 support. > > Signed-off-by: Christian Melki <christian.me...@t2data.com> > Message-Id: <20230722100132.1728724-1-christian.me...@t2data.com> > Signed-off-by: Michael Olbrich <m.olbr...@pengutronix.de> > > diff --git a/rules/openssh.make b/rules/openssh.make > index f8a55019b855..5a1733f7ce68 100644 > --- a/rules/openssh.make > +++ b/rules/openssh.make > @@ -15,8 +15,8 @@ PACKAGES-$(PTXCONF_OPENSSH) += openssh > # > # Paths and names > # > -OPENSSH_VERSION := 9.3p1 > -OPENSSH_MD5 := 3430d5e6e71419e28f440a42563cb553 > +OPENSSH_VERSION := 9.3p2 > +OPENSSH_MD5 := e21180e7c902e596b047b5520842c2e1 > OPENSSH := openssh-$(OPENSSH_VERSION) > OPENSSH_SUFFIX := tar.gz > OPENSSH_URL := \