415 Commits

Author SHA256 Message Date
2dba52c3bf Accepting request 1322252 from network
Remove erroneous %config() directive (forwarded request 1322250 from hpjansson)

OBS-URL: https://build.opensuse.org/request/show/1322252
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=198
2025-12-15 10:45:10 +00:00
Hans Petter Jansson
1d01146336 Accepting request 1322250 from home:hpjansson:branches:network
Remove erroneous %config() directive

OBS-URL: https://build.opensuse.org/request/show/1322250
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=300
2025-12-11 17:14:43 +00:00
Hans Petter Jansson
0b11be1c02 Accepting request 1322246 from home:hpjansson:branches:network
- Install 50-suse.conf in distconfdir instead of sysconfdir if
  possible (bsc#1254374).

OBS-URL: https://build.opensuse.org/request/show/1322246
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=299
2025-12-11 16:44:58 +00:00
7c848a72a5 Accepting request 1313013 from network
OBS-URL: https://build.opensuse.org/request/show/1313013
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=197
2025-11-01 22:34:10 +00:00
9e7097ab26 Accepting request 1313012 from home:alarrosa:branches:network
Drop patches that were supposed to be dropped in my previous commit

OBS-URL: https://build.opensuse.org/request/show/1313012
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=298
2025-10-22 07:55:59 +00:00
b54837afd9 Accepting request 1311450 from home:alarrosa:branches:network
- "Update" to openssh 10.2p1:
  * No changes for askpass, see main package changelog for
    details.
- Build with gcr-4 in Factory and SLE-16/Leap 16 instead of gtk-3

- Update to openssh 10.2p1:
  = Future deprecation warning
  * A future release of OpenSSH will deprecate support for SHA1
    SSHFP records due to weaknesses in the SHA1 hash function.
    SHA1 SSHFP DNS records will be ignored and ssh-keygen -r
    will generate only SHA256 SSHFP records.
    The SHA256 hash algorithm, which has no known weaknesses, has
    been supported for SSHFP records since OpenSSH 6.1, released
    in 2012.
  = Bugfixes
  * ssh(1): fix mishandling of terminal connections when
    ControlPersist was active that rendered the session unusable.
    bz3872
  * ssh-keygen(1): fix download of keys from PKCS#11 tokens.
  * ssh-keygen(1): fix CA signing operations when the CA key is
    held in a ssh-agent(1). bz3877
  = Portability
  * All: support platforms without mmap(2), e.g. WASM builds such
    as https://hterm.org
  * All: fix builds on FreeBSD for missing fnctl.h include.
  * All: fix builds on MacOS <10.12 Sierra, which lacks
    clock_gettime(3)
  * sshd(8): don't PAM_RHOST if the remote host is the "UNKNOWN"
    placeholder name. Avoids potential hangs in some PAM modules
    as they try to resolve it. Note, sshd(8) only uses the

OBS-URL: https://build.opensuse.org/request/show/1311450
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=297
2025-10-15 11:05:19 +00:00
d20a7193ac Accepting request 1306629 from network
- Add patch to relax the openssl 3.x version check so that we
  don't identify a mismatch between released and pre-release
  versions as incompatible when we already identify the whole
  3.x versions as compatible (boo#1250115):
  * openssh-10.0p2-relax-openssl-version-check.patch
- Run some of the tests to check there are no regressions.

OBS-URL: https://build.opensuse.org/request/show/1306629
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=196
2025-09-23 18:47:02 +00:00
ad5a43d019 Accepting request 1306458 from home:alarrosa:branches:network
- Add patch to relax the openssl 3.x version check so that we
  don't identify a mismatch between released and pre-release
  versions as incompatible when we already identify the whole
  3.x versions as compatible (boo#1250115):
  * openssh-10.0p2-relax-openssl-version-check.patch
- Run some of the tests to check there are no regressions.

OBS-URL: https://build.opensuse.org/request/show/1306458
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=296
2025-09-22 11:57:41 +00:00
e9dd878d4a Accepting request 1304676 from network
- Update sshd@.service to match upstream more closely, to enable
  support for ephemeral sshd keys.
- Add openssh-9.6p1-pam-rhost.patch which fixes a performance issue
  where pam can do a reverse dns query of "UNKNOWN" which times out
  multiple times, causing a substantial slowdown when logging in
  (bsc#1249352). (forwarded request 1304675 from hpjansson)

OBS-URL: https://build.opensuse.org/request/show/1304676
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=195
2025-09-15 17:50:24 +00:00
Hans Petter Jansson
de7e9eb432 Accepting request 1304675 from home:hpjansson:branches:network
- Update sshd@.service to match upstream more closely, to enable
  support for ephemeral sshd keys.
- Add openssh-9.6p1-pam-rhost.patch which fixes a performance issue
  where pam can do a reverse dns query of "UNKNOWN" which times out
  multiple times, causing a substantial slowdown when logging in
  (bsc#1249352).

OBS-URL: https://build.opensuse.org/request/show/1304675
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=295
2025-09-14 19:59:36 +00:00
Hans Petter Jansson
739aa15d50 Accepting request 1303317 from home:ldragon:branches:network
- Update sshd@.service to match upstream more closely, to enable support for ephemeral sshd keys
- add openssh-9.6p1-pam-rhost.patch which fixes a performance issue where pam can do a reverse dns query of "UNKNOWN" which times out multiple times, causing a substantial slowdown when logging in. (bsc#1249352)

OBS-URL: https://build.opensuse.org/request/show/1303317
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=294
2025-09-10 14:47:12 +00:00
f31eacd216 Accepting request 1277188 from network
OBS-URL: https://build.opensuse.org/request/show/1277188
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=194
2025-05-15 14:59:35 +00:00
3f765a9f36 Accepting request 1277186 from home:alarrosa:branches:network:openssh
- Enable --with-logind to call the SetTTY dbus method in systemd
  in SLE15 too. This allows "wall" to print messages in ssh ttys
  (bsc#1239671)
- Small fixes to unref the dbus session when any error occurs:
  * logind_set_tty.patch

    forwarding is off by default in the client (bsc#1241012,
    CVE-2025-32728)

OBS-URL: https://build.opensuse.org/request/show/1277186
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=293
2025-05-13 15:12:56 +00:00
6f3f9af988 Accepting request 1272617 from network
OBS-URL: https://build.opensuse.org/request/show/1272617
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=193
2025-04-25 20:18:22 +00:00
047599f17a Accepting request 1272616 from home:alarrosa:branches:network
OBS-URL: https://build.opensuse.org/request/show/1272616
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=292
2025-04-25 08:52:00 +00:00
2a3b9467bf Accepting request 1271991 from home:hpjansson:branches:network
- Add openssh-send-extra-term-env.patch, which appends a few
  environment variables useful for terminal identification to the
  default send and accept lists.

OBS-URL: https://build.opensuse.org/request/show/1271991
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=291
2025-04-23 13:19:09 +00:00
b959300e38 Accepting request 1268318 from home:alarrosa:branches:network
OBS-URL: https://build.opensuse.org/request/show/1268318
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=290
2025-04-10 08:34:48 +00:00
57da6e38d0 Accepting request 1268313 from home:alarrosa:branches:network
- "Update" to openssh 10.0p2:
  * No changes for askpass, see main package changelog for
    details.

OBS-URL: https://build.opensuse.org/request/show/1268313
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=289
2025-04-10 08:29:39 +00:00
d7c0e6582d Accepting request 1268307 from home:alarrosa:branches:network
- "Update" to openssh 10.0p2:
  - There was an issue during the packaging of 10.0p1 which made it
    identify itself as 10.0p2 so 10.0p1 is now considered identical
    to 10.0p2 and upstream won't release a separate 10.0p2 package.

OBS-URL: https://build.opensuse.org/request/show/1268307
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=288
2025-04-10 08:25:01 +00:00
5f4c611aa2 Accepting request 1268142 from home:alarrosa:branches:network
- Do not try to create /etc/ssh in sshd-gen-keys-start
  (bsc#1238191). sshd-gen-keys-start transitions to a SELinux
  domain that doesn't have the necessary permissions. Based on
  a SR by Johannes Segitz <jsegitz@suse.com>.

OBS-URL: https://build.opensuse.org/request/show/1268142
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=287
2025-04-09 11:17:47 +00:00
b8f5e88ace Accepting request 1268126 from home:alarrosa:branches:network
- Update to openssh 10.0p1:
  * No changes for askpass, see main package changelog for
    details.

- Update to openssh 10.0p1:
  = Potentially-incompatible changes
  * This release removes support for the weak DSA signature
    algorithm, completing the deprecation process that began in
    2015 (when DSA was disabled by default) and repeatedly warned
    over the last 12 months.
  * scp(1), sftp(1): pass "ControlMaster no" to ssh when invoked by
    scp & sftp. This disables implicit session creation by these
    tools when ControlMaster was set to yes/auto by configuration,
    which some users found surprising. This change will not prevent
    scp/sftp from using an existing multiplexing session if one had
    already been created. GHPR557
  * This release has the version number 10.0 and announces itself
    as "SSH-2.0-OpenSSH_10.0". Software that naively matches
    versions using patterns like "OpenSSH_1*" may be confused by
    this.
  * sshd(8): this release removes the code responsible for the
    user authentication phase of the protocol from the per-
    connection sshd-session binary to a new sshd-auth binary.
    Splitting this code into a separate binary ensures that the
    crucial pre-authentication attack surface has an entirely
    disjoint address space from the code used for the rest of the
    connection. It also yields a small runtime memory saving as the
    authentication code will be unloaded after the authentication
    phase completes. This change should be largely invisible to
    users, though some log messages may now come from "sshd-auth"

OBS-URL: https://build.opensuse.org/request/show/1268126
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=286
2025-04-09 10:49:15 +00:00
9b98897fa5 Accepting request 1267606 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1267606
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=192
2025-04-08 15:50:42 +00:00
69ce3dda1b Accepting request 1255379 from home:hillwood:branches:network
- Disable seccomp_filter and rlimitsandbox sandbox for loongarch. 
  seccomp_filter and rlimitsandbox not supported on loongarch64 yet.

OBS-URL: https://build.opensuse.org/request/show/1255379
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=285
2025-04-07 10:00:08 +00:00
d355023437 Accepting request 1246976 from network
OBS-URL: https://build.opensuse.org/request/show/1246976
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=191
2025-02-20 15:27:08 +00:00
e0df6f2027 Accepting request 1246973 from home:alarrosa:branches:network:openssh
- merge openssh-fips into the main openssh package (bsc#1185116)

OBS-URL: https://build.opensuse.org/request/show/1246973
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=284
2025-02-19 09:31:07 +00:00
f6f46c8964 Accepting request 1246612 from network
OBS-URL: https://build.opensuse.org/request/show/1246612
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=190
2025-02-18 18:08:49 +00:00
f339972869 Accepting request 1246611 from home:alarrosa:branches:openssh-9.9
- Update to openssh 9.9p2:
  = Security
  * Fix CVE-2025-26465 - ssh(1) in OpenSSH versions 6.8p1 to 9.9p1
    (inclusive) contained a logic error that allowed an on-path
    attacker (a.k.a MITM) to impersonate any server when the
    VerifyHostKeyDNS option is enabled. This option is off by
    default.
  * Fix CVE-2025-26466 - sshd(8) in OpenSSH versions 9.5p1 to 9.9p1
    (inclusive) is vulnerable to a memory/CPU denial-of-service
    related to the handling of SSH2_MSG_PING packets. This
    condition may be mitigated using the existing
    PerSourcePenalties feature.
  Both vulnerabilities were discovered and demonstrated to be
  exploitable by the Qualys Security Advisory team. The openSSH
  team thanks them for their detailed review of OpenSSH.
  = Bugfixes
  * ssh(1), sshd(8): fix regression in Match directive that caused
    failures when predicates and their arguments were separated by
    '=' characters instead of whitespace (bz3739).
  * sshd(8): fix the "Match invalid-user" predicate, which was
    matching incorrectly in the initial pass of config evaluation.
  * ssh(1), sshd(8), ssh-keyscan(1): fix mlkem768x25519-sha256 key
    exchange on big-endian systems.
  * Fix a number of build problems on particular operating systems
    and configurations.
- Remove patches that are already included in 9.9p2:
  * 0001-fix-utmpx-ifdef.patch
  * 0002-upstream-fix-regression-introduced-when-I-switched-the-Match.patch
  * 0003-upstream-fix-previous-change-to-ssh_config-Match_-which-broken-on.patch
  * 0004-upstream-fix-ML-KEM768x25519-KEX-on-big-endian-systems-spotted-by.patch

OBS-URL: https://build.opensuse.org/request/show/1246611
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=283
2025-02-18 09:56:28 +00:00
22f1706ec3 Accepting request 1246591 from home:alarrosa:branches:openssh-9.9
- Fix a MitM attack against OpenSSH's VerifyHostKeyDNS-enabled
  client and a DoS attack against OpenSSH's client and server
  (bsc#1237040, CVE-2025-26465, bsc#1237041, CVE-2025-26466):
  * fix-CVE-2025-26465-and-CVE-2025-26466.patch

OBS-URL: https://build.opensuse.org/request/show/1246591
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=282
2025-02-18 09:10:29 +00:00
995b065381 Accepting request 1244734 from network
OBS-URL: https://build.opensuse.org/request/show/1244734
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=189
2025-02-11 20:20:54 +00:00
add4626a51 Accepting request 1239575 from home:dimstar:Factory
- Drop rcFOO symlinks for CODE16 (PED-266).

OBS-URL: https://build.opensuse.org/request/show/1239575
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=281
2025-02-10 11:55:37 +00:00
61d891fade Accepting request 1218789 from network
OBS-URL: https://build.opensuse.org/request/show/1218789
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=188
2024-10-29 13:31:58 +00:00
051e180f88 Accepting request 1218787 from home:alarrosa:branches:network:openssh
- Don't force using gcc11 on SLFO/ALP which have a newer version.

OBS-URL: https://build.opensuse.org/request/show/1218787
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=280
2024-10-28 11:22:01 +00:00
2c8525e1db Accepting request 1218784 from home:alarrosa:branches:network:openssh
- Add patches from upstream:
  - To fix a copy&paste oversight in an ifdef :
  * 0001-fix-utmpx-ifdef.patch
  - To fix a regression introduced when the "Match" criteria
    tokenizer was modified since it stopped supporting the
    "Match criteria=argument" format:
  * 0002-upstream-fix-regression-introduced-when-I-switched-the-Match.patch
  - To fix the previous patch which broke on negated Matches:
  * 0003-upstream-fix-previous-change-to-ssh_config-Match_-which-broken-on.patch
  - To fix the ML-KEM768x25519 kex algorithm on big-endian systems:
  * 0004-upstream-fix-ML-KEM768x25519-KEX-on-big-endian-systems-spotted-by.patch

OBS-URL: https://build.opensuse.org/request/show/1218784
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=279
2024-10-28 11:16:49 +00:00
bcb2667cc6 Accepting request 1207974 from network
OBS-URL: https://build.opensuse.org/request/show/1207974
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=187
2024-10-15 12:57:58 +00:00
ef827d0687 Accepting request 1207973 from home:alarrosa:branches:network:openssh
- Use %{with ...} instead of 0%{with ...}

OBS-URL: https://build.opensuse.org/request/show/1207973
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=278
2024-10-14 15:20:38 +00:00
e646e40a19 Accepting request 1207806 from network
OBS-URL: https://build.opensuse.org/request/show/1207806
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=186
2024-10-14 11:06:29 +00:00
2dc91d93a7 Accepting request 1207644 from home:alarrosa:branches:network:openssh
Updated the patch with a suggestion from upstream.

- Add a patch to fix a regression introduced in 9.6 that makes X11
  forwarding very slow. Submitted to upstream in
  https://bugzilla.mindrot.org/show_bug.cgi?id=3655#c4 . Fixes
  bsc#1229449:
  * fix-x11-regression-bsc1229449.patch
- Remove empty line at the end of sshd-sle.pamd (bsc#1227456)

OBS-URL: https://build.opensuse.org/request/show/1207644
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=277
2024-10-14 06:33:00 +00:00
b739f7b79a Accepting request 1203550 from network
OBS-URL: https://build.opensuse.org/request/show/1203550
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=185
2024-09-26 16:52:30 +00:00
fadb689fba Accepting request 1203549 from home:alarrosa:branches:network:openssh
- Add a const to the openssl 1.1/RSA section of sshkey_is_private
  to keep it similar to what it used before the 9.9 rebase:
  * openssh-8.1p1-audit.patch
- Add a openssl11 bcond to the spec file for the SLE12 case
  instead of checking suse_version in different parts.
- Move conditional patches to a number >= 1000.

OBS-URL: https://build.opensuse.org/request/show/1203549
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=276
2024-09-25 11:55:37 +00:00
b07c141055 Accepting request 1202729 from home:alarrosa:branches:network:openssh
- Update to openssh 9.9p1:
  * No changes for askpass, see main package changelog for
    details.

- Update to openssh 9.9p1:
  = Future deprecation notice
  * OpenSSH plans to remove support for the DSA signature algorithm
    in early 2025. This release disables DSA by default at compile
    time. DSA, as specified in the SSHv2 protocol, is inherently
    weak - being limited to a 160 bit private key and use of the
    SHA1 digest. Its estimated security level is only 80 bits
    symmetric equivalent.
    OpenSSH has disabled DSA keys by default since 2015 but has
    retained run-time optional support for them. DSA was the only
    mandatory-to-implement algorithm in the SSHv2 RFCs, mostly
    because alternative algorithms were encumbered by patents when
    the SSHv2 protocol was specified.
    This has not been the case for decades at this point and better
    algorithms are well supported by all actively-maintained SSH
    implementations. We do not consider the costs of maintaining
    DSA in OpenSSH to be justified and hope that removing it from
    OpenSSH can accelerate its wider deprecation in supporting
    cryptography libraries.
  = Potentially-incompatible changes
  * ssh(1): remove support for pre-authentication compression.
    OpenSSH has only supported post-authentication compression in
    the server for some years. Compression before authentication
    significantly increases the attack surface of SSH servers and
    risks creating oracles that reveal information about
    information sent during authentication.

OBS-URL: https://build.opensuse.org/request/show/1202729
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=275
2024-09-25 08:42:29 +00:00
4c7b461ba5 Accepting request 1200282 from network
OBS-URL: https://build.opensuse.org/request/show/1200282
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=184
2024-09-13 12:26:08 +00:00
a674f65c97 Accepting request 1200272 from home:alarrosa:branches:network:openssh
- Drop most of openssh-6.6p1-keycat.patch (actually, it was just
  commented out). The keycat binary isn't really installed nor
  supported, so we can drop it, except for the code that is used
  by other SELinux patches, which is what I kept from that patch
  (boo#1229072).
- Add patch submitted to upstream to fix RFC4256 implementation
  so that keyboard-interactive authentication method can send
  instructions and sshd shows them to users even before a prompt
  is requested. This fixes MFA push notifications (boo#1229010).
  * 0001-auth-pam-Immediately-report-instructions-to-clients-and-fix-handling-in-ssh-client.patch

OBS-URL: https://build.opensuse.org/request/show/1200272
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=274
2024-09-12 10:24:41 +00:00
dd0b90d773 Accepting request 1196434 from network
- Update to openssh 9.8p1:
  * No changes for askpass, see main package changelog for
    details.

- Add patch to fix sshd not logging in the audit failed login
  attempts (submitted to upstream in
  https://github.com/openssh/openssh-portable/pull/516):
  * fix-audit-fail-attempt.patch
- Use --enable-dsa-keys when building openssh. It's required if
  the user sets the crypto-policy mode to LEGACY, where DSA keys
  should be allowed. The option was added by upstream in 9.7 and
  set to disabled by default.
- These two changes fix 2 of the 3 issues reported in bsc#1229650.

- Fix a dbus connection leaked in the logind patch that was
  missing a sd_bus_unref call (found by Matthias Gerstner):
  * logind_set_tty.patch
- Add a patch that fixes a small memory leak when parsing the
  subsystem configuration option:
  * fix-memleak-in-process_server_config_line_depth.patch

- Update to openssh 9.8p1:
  = Security
  * 1) Race condition in sshd(8) (bsc#1226642, CVE-2024-6387).
    A critical vulnerability in sshd(8) was present in Portable
    OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may
    allow arbitrary code execution with root privileges.
    Successful exploitation has been demonstrated on 32-bit
    Linux/glibc systems with ASLR. Under lab conditions, the attack
    requires on average 6-8 hours of continuous connections up to

OBS-URL: https://build.opensuse.org/request/show/1196434
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=183
2024-08-29 13:42:55 +00:00
1569d989cc Accepting request 1195723 from home:alarrosa:branches:network:openssh
- Add patch to fix sshd not logging in the audit failed login
  attempts (submitted to upstream in
  https://github.com/openssh/openssh-portable/pull/516):
  * fix-audit-fail-attempt.patch
- Use --enable-dsa-keys when building openssh. It's required if
  the user sets the crypto-policy mode to LEGACY, where DSA keys
  should be allowed. The option was added by upstream in 9.7 and
  set to disabled by default.
- These two changes fix 2 of the 3 issues reported in bsc#1229650.

OBS-URL: https://build.opensuse.org/request/show/1195723
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=273
2024-08-23 12:36:12 +00:00
4250fc3556 https://bugzilla.opensuse.org/show_bug.cgi?id=1229650
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=182
2024-08-22 10:34:42 +00:00
ba4e65df9d Accepting request 1194679 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1194679
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=181
2024-08-21 21:24:44 +00:00
06eb772e55 Accepting request 1193382 from home:alarrosa:branches:network:openssh-9.8
- Update to openssh 9.8p1:
  * No changes for askpass, see main package changelog for
    details.

- Fix a dbus connection leaked in the logind patch that was
  missing a sd_bus_unref call (found by Matthias Gerstner):
  * logind_set_tty.patch
- Add a patch that fixes a small memory leak when parsing the
  subsystem configuration option:
  * fix-memleak-in-process_server_config_line_depth.patch

- Update to openssh 9.8p1:
  = Security
  * 1) Race condition in sshd(8) (bsc#1226642, CVE-2024-6387).
    A critical vulnerability in sshd(8) was present in Portable
    OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may
    allow arbitrary code execution with root privileges.
    Successful exploitation has been demonstrated on 32-bit
    Linux/glibc systems with ASLR. Under lab conditions, the attack
    requires on average 6-8 hours of continuous connections up to
    the maximum the server will accept. Exploitation on 64-bit
    systems is believed to be possible but has not been
    demonstrated at this time. It's likely that these attacks will
    be improved upon.
    Exploitation on non-glibc systems is conceivable but has not
    been examined. Systems that lack ASLR or users of downstream
    Linux distributions that have modified OpenSSH to disable
    per-connection ASLR re-randomisation (yes - this is a thing, no
    - we don't understand why) may potentially have an easier path
    to exploitation. OpenBSD is not vulnerable.

OBS-URL: https://build.opensuse.org/request/show/1193382
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=272
2024-08-12 09:54:46 +00:00
0a7eb65981 Accepting request 1185823 from network
OBS-URL: https://build.opensuse.org/request/show/1185823
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssh?expand=0&rev=180
2024-07-08 17:06:54 +00:00
23e8b1f01b Accepting request 1185821 from home:alarrosa:branches:network:openssh
- Add patch from upstream to fix proxy multiplexing mode:
  * 0001-upstream-fix-proxy-multiplexing-mode_-broken-when-keystroke.patch
- Add patch from upstream to restore correctly sigprocmask
  * 0001-upstream-correctly-restore-sigprocmask-around-ppoll.patch
- Add patch from upstream to fix a logic error in
  ObscureKeystrokeTiming that rendered this feature ineffective,
  allowing a passive observer to detect which network packets
  contained real keystrokes (bsc#1227318, CVE-2024-39894):
  * 0001-upstream-when-sending-ObscureKeystrokeTiming-chaff-packets_.patch

OBS-URL: https://build.opensuse.org/request/show/1185821
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=271
2024-07-05 19:01:36 +00:00
ccaaac730e Accepting request 1185775 from home:alarrosa:branches:network:openssh
- Add obsoletes for openssh-server-config-rootlogin since that
  package existed for a brief period of time during SLE 15 SP6/
  Leap 15.6 development but even if it was removed from the
  repositories before GM, some users might have it in their
  systems from having tried a beta/RC release (boo#1227350).

    quoting was present in the user-supplied ssh_config(5) directive
    (bsc#1218215, CVE-2023-51385).

OBS-URL: https://build.opensuse.org/request/show/1185775
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=270
2024-07-05 11:34:53 +00:00