Thanks, applied as b233b1d1b1ba46c691d410cf17acd67c785dc226.

Michael

[sent from post-receive hook]

On Tue, 01 Aug 2023 09:48:54 +0200, Christian Melki 
<christian.me...@t2data.com> wrote:
> Patchlevel release to fix CVE.
> https://www.openssh.com/txt/release-9.3p2
> 
> CVE-2023-38408 - Remote exec in ssh-agent PKCS#11 support.
> 
> Signed-off-by: Christian Melki <christian.me...@t2data.com>
> Message-Id: <20230722100132.1728724-1-christian.me...@t2data.com>
> Signed-off-by: Michael Olbrich <m.olbr...@pengutronix.de>
> 
> diff --git a/rules/openssh.make b/rules/openssh.make
> index f8a55019b855..5a1733f7ce68 100644
> --- a/rules/openssh.make
> +++ b/rules/openssh.make
> @@ -15,8 +15,8 @@ PACKAGES-$(PTXCONF_OPENSSH) += openssh
>  #
>  # Paths and names
>  #
> -OPENSSH_VERSION      := 9.3p1
> -OPENSSH_MD5  := 3430d5e6e71419e28f440a42563cb553
> +OPENSSH_VERSION      := 9.3p2
> +OPENSSH_MD5  := e21180e7c902e596b047b5520842c2e1
>  OPENSSH              := openssh-$(OPENSSH_VERSION)
>  OPENSSH_SUFFIX       := tar.gz
>  OPENSSH_URL  := \

Reply via email to