http://www.openwall.com/lists/oss-security/2015/05/16/3
It seems really harmless, but I'll apply it anyway. Thanks for notifying me.
Committed.
A commit references this bug: Author: bdrewery Date: Sat May 16 16:28:40 UTC 2015 New revision: 386554 URL: https://svnweb.freebsd.org/changeset/ports/386554 Log: Avoid a potential read overflow. This was not deemed a security issue by upstream; it was fixed upstream comprehensively a few weeks ago in 77199d6ec8986d470487e66f8ea8f4cf43d2e20c. PR: 200241 Patch by: Hanno B?ck <hanno@hboeck.de> Obtained from: http://www.openwall.com/lists/oss-security/2015/05/16/3 Changes: head/security/openssh-portable/Makefile head/security/openssh-portable/files/patch-compat.c