** SECURITY UPDATE ** - OpenSSH 5.8p
Fix vulnerability in legacy certificate signing introduced in OpenSSH-5.6 and found by Mateusz Kocielski.
Legacy certificates signed by OpenSSH 5.6 or 5.7 included data from the stack in place of a random nonce field. The contents of the stack do not appear to contain private data at this point, but this cannot be stated with certainty for all platform, library and compiler combinations. In particular, there exists a risk that some bytes from the privileged CA key may be accidentally included.
A full advisory for this issue is available at: http://www.openssh.com/txt/legacy-cert.adv
2. UPDATE - Control Panel 2.0.3
More stable support for domain user activation (Use domainname\user to logon).
Bugfix. Empty activated user list after completing wizard
MD5 Signature:
da3ca0dd294db57767ca47cf14bb6a3d *Copssh_4.0.4_Installer.zip
SHA256 Signature:
690c5ac0c2f72bbc9754f8bf914b376d2098a3ee3a5578c728b4b859927d5bf6 *Copssh_4.0.4_Installer.zip
Download: http://itefix.no/i2/download