Commit Graph

29 Commits

Author SHA1 Message Date
John Audia
67784bf4d0 openssh: bump to 9.9p2
Updated and removed upstreamed patch.

Highlights relating to security:

* Fix CVE-2025-26465 - ssh(1) in OpenSSH versions 6.8p1 to 9.9p1
  (inclusive) contained a logic error that allowed an on-path
  attacker (a.k.a MITM) to impersonate any server when the
  VerifyHostKeyDNS option is enabled. This option is off by default.

* Fix CVE-2025-26466 - sshd(8) in OpenSSH versions 9.5p1 to 9.9p1
  (inclusive) is vulnerable to a memory/CPU denial-of-service related
  to the handling of SSH2_MSG_PING packets. This condition may be
  mitigated using the existing PerSourcePenalties feature.

Both vulnerabilities were discovered and demonstrated to be exploitable
by the Qualys Security Advisory team. We thank them for their detailed
review of OpenSSH.

Full release notes: https://www.openssh.com/txt/release-9.9p2

Signed-off-by: John Audia <therealgraysky@proton.me>
2025-02-20 16:48:21 +08:00
John Audia
b90e9b7eba openssh: bump to 9.9p1
Release notes: https://www.openssh.com/txt/release-9.9

Added upstream patch to fix build[1]

1. 76a618d284.patch

Build system: x86/64
Build-tested: x86/64/AMD Cezanne
Run-tested: x86/64/AMD Cezanne

Signed-off-by: John Audia <therealgraysky@proton.me>
2024-09-26 14:15:13 +02:00
Sean Khan
c7f099a19c openssh: fix incompatible ptr type error GCC 14.1
The `ssh_systemd_notify` function is causing compilation errors
when built against GCC 14.1. This is due to an incompatible pointer
type being passed to the connect function.

The connect function expects a pointer to `struct sockaddr`, but
was receiving a pointer to `struct sockaddr_un`.

Signed-off-by: Sean Khan <datapronix@protonmail.com>
2024-07-05 13:41:33 -07:00
John Audia
6be0617c00 openssh: bump to 9.7p1
Release notes: https://www.openssh.com/txt/release-9.7

Removed upstreamed patch: 010-better_fzero-call-detection.patch

Build system: x86/64
Build-tested: x86/64/AMD Cezanne
Run-tested: x86/64/AMD Cezanne

Signed-off-by: John Audia <therealgraysky@proton.me>
2024-03-19 23:07:15 +01:00
Sibren Vasse
a79c49578c openssh: fix build failure on powerpc_8548
1036d77b34

Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2024-01-06 13:48:02 -08:00
Philip Prindeville
ead95a26b6 openssh: add server config subdirectory
Most distros allow dropping site configuration files into
/etc/sshd_config.d/ so that you don't have to tweak the main
server configuration file.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-08-07 16:39:56 -07:00
Sibren Vasse
08b45115d7 openssh: update to 9.0p1
Remove upstreamed patches.

Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2022-04-13 15:46:37 -07:00
Michal Vasilek
ee7aae202a openssh: update to 8.9p1
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-03-16 19:53:38 -07:00
Sibren Vasse
0c2554222f openssh: update to 8.1p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2019-11-09 15:17:35 +01:00
Rosen Penev
5a3e520f45 openssh: Fix compilation with -Wimplicit-function
Upstream backport.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-07-21 12:31:31 +02:00
Peter Wagner
626a4315a9 openssh: update to 8.0p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-04-20 18:09:21 +02:00
Peter Wagner
d92d34db5a openssh: add upstream patches, including CVE-2019-6111
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-03-03 12:20:18 +01:00
Jan Pavlinec
4729c3fddf openssh: patch scp security issues
Fixes
CVE-2019-6109
CVE-2019-6111

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-02-10 16:22:41 +01:00
Peter Wagner
d82cc22019 openssh: backport patch for CVE-2018-20685
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2019-01-15 20:34:03 +01:00
Peter Wagner
08c5f7cfab openssh: fixes issues with some openssl options
This adds a couple of patches when setting some openssl options:
* ECDSA code in openssh-compat.h and libressl-api-compat.c needs to be
  be guarded by OPENSSL_HAS_ECC; otherwise, it will not build with
  openssl compiled without ECC support.

* Fix openssl version number in openbsd-compat/openssl-compat.c which
  failed to compile --with-ssl-engine; this option is used when
  CONFIG_OPENSSL_ENGINE_CRYPTO=y

Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-10-20 14:06:20 +02:00
Peter Wagner
2759048914 openssh: update to 7.9p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-10-19 18:11:54 +02:00
Eneas U de Queiroz
9f76fe1445 openssh: add openssl 1.1.0 compatibility
Five commits from upstream were applied to v. 7.8-p1:

482d23bc upstream: hold our collective noses and use the openssl-1.1.x
         API in
48f54b9d adapt -portable to OpenSSL 1.1x API
86e0a9f3 upstream: use only openssl-1.1.x API here too
a3fd8074 upstream: missed a bit of openssl-1.0.x API in this unittest
d64e7852 add compat header

Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
2018-09-30 18:59:04 +02:00
Peter Wagner
eacb9464e9 openssh: update to 7.8p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-08-27 21:30:14 +02:00
Peter Wagner
739c65e569 openssh: update to 7.7p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2018-04-08 19:13:59 +02:00
Daniel Golle
d96c092a00 Revert "The earlier commit ea119211b2 removed 'dsa' as one of the ssh_host_*_key"
The author (@pprindeville) of the original commit noted that the wrong
commit was picked, see
325b7d2cd2 (commitcomment-22387528)
"Err... looks like the wrong fix got committed. I was hoping that this
commit d902e5d would have gone in instead."

This reverts commit 325b7d2cd2.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2017-06-05 18:22:03 +02:00
Peter Wagner
325b7d2cd2 The earlier commit ea119211b2 removed 'dsa' as one of the ssh_host_*_key
types that got generated.  Problem was that it didn't remove that key
as one of the paths that the server looks for by default.  As a
consequence, your log file might fill up with messages like:

    2017-06-01T15:43:07-06:00 openwrt sshd[31929]: error: Could not load host key: /etc/ssh/ssh_host_dsa_key

The patch is forunately trivial.  Don't set the path for the dsa
key file in the server configuration.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2017-06-03 01:04:27 +02:00
Peter Wagner
9be7653a3a openssh: update to 7.5p1, remove unneeded patches
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2017-03-21 23:30:54 +01:00
Peter Wagner
89b8be4135 openssh: update to 7.4p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2016-12-22 00:48:51 +01:00
Peter Wagner
afb706d146 openssh: Unregister the KEXINIT handler after message has been
received. Otherwise an unauthenticated peer can repeat the KEXINIT and cause
allocation of up to 128MB -- until the connection is closed. Reported by
shilei-c at 360.cn

ec165c392c

Signed-off-by: Peter Wagner <tripolar@gmx.at>
2016-10-17 21:26:26 +02:00
Peter Wagner
c67b05b269 openssh: move inbound NEWKEYS handling to kex layer; otherwise early NEWKEYS causes NULL deref
see: https://anongit.mindrot.org/openssh.git/commit/?id=28652bca29046f62c7045e933e6b931de1d16737

Signed-off-by: Peter Wagner <tripolar@gmx.at>
2016-10-03 21:38:15 +02:00
Peter Wagner
7ad9eb6703 openssh: update to 7.3p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2016-08-09 18:58:22 +02:00
Peter Wagner
9322b6e80b openssh: update to 6.8p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2015-03-19 10:35:59 +01:00
Peter Wagner
30bdda47fb openssh: update to 6.7p1
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2014-10-19 04:45:16 +02:00
Peter Wagner
fe62d146fa openssh: import from packages
Signed-off-by: Peter Wagner <tripolar@gmx.at>
2014-06-16 11:45:34 +02:00