Date: Wed, 19 Oct 2011 21:36:50 +0200 From: "Grzegorz Blach" <magik@roorback.net> To: "FreeBSD gnats submit" <FreeBSD-gnats-submit@FreeBSD.org> Subject: ports/161818: security/openssh-portable: Updated to 5.8p2 Message-ID: <1319053010.37354@silver.nine> Resent-Message-ID: <201110191940.p9JJe8rp054462@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 161818 >Category: ports >Synopsis: security/openssh-portable: Updated to 5.8p2 >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Wed Oct 19 19:40:08 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Grzegorz Blach >Release: FreeBSD 8.2-STABLE amd64 >Organization: >Environment: System: FreeBSD 8.2-STABLE #14 r225746: Sun Sep 25 02:17:07 CEST 2011 magik@silver.nine:/usr/obj/usr/src/sys/SILVER >Description: Port security/openssh-portable updated from 5.2p1 to 5.8p2 with additional patches. Diff is huge (314kb), so in this PR I'm sending only link to it: https://github.com/downloads/Roorback/mgk_ports/openssh-portable.diff.txt This diff (to port) remove additional patches (to openssh) from `files` subdir and replace its with PATCH_SITES, PATCHFILES enteries in Makefile Severity is serious, because 5.2p1 version is vulnerable: http://openssh.org/security.html Priority is high, because I'll be glad if this patch will be commited before 9.0 release. >How-To-Repeat: >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1319053010.37354>