252 Commits

Author SHA256 Message Date
Hans Petter Jansson
0b11be1c02 Accepting request 1322246 from home:hpjansson:branches:network
- Install 50-suse.conf in distconfdir instead of sysconfdir if
  possible (bsc#1254374).

OBS-URL: https://build.opensuse.org/request/show/1322246
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=299
2025-12-11 16:44:58 +00:00
b54837afd9 Accepting request 1311450 from home:alarrosa:branches:network
- "Update" to openssh 10.2p1:
  * No changes for askpass, see main package changelog for
    details.
- Build with gcr-4 in Factory and SLE-16/Leap 16 instead of gtk-3

- Update to openssh 10.2p1:
  = Future deprecation warning
  * A future release of OpenSSH will deprecate support for SHA1
    SSHFP records due to weaknesses in the SHA1 hash function.
    SHA1 SSHFP DNS records will be ignored and ssh-keygen -r
    will generate only SHA256 SSHFP records.
    The SHA256 hash algorithm, which has no known weaknesses, has
    been supported for SSHFP records since OpenSSH 6.1, released
    in 2012.
  = Bugfixes
  * ssh(1): fix mishandling of terminal connections when
    ControlPersist was active that rendered the session unusable.
    bz3872
  * ssh-keygen(1): fix download of keys from PKCS#11 tokens.
  * ssh-keygen(1): fix CA signing operations when the CA key is
    held in a ssh-agent(1). bz3877
  = Portability
  * All: support platforms without mmap(2), e.g. WASM builds such
    as https://hterm.org
  * All: fix builds on FreeBSD for missing fnctl.h include.
  * All: fix builds on MacOS <10.12 Sierra, which lacks
    clock_gettime(3)
  * sshd(8): don't PAM_RHOST if the remote host is the "UNKNOWN"
    placeholder name. Avoids potential hangs in some PAM modules
    as they try to resolve it. Note, sshd(8) only uses the

OBS-URL: https://build.opensuse.org/request/show/1311450
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=297
2025-10-15 11:05:19 +00:00
ad5a43d019 Accepting request 1306458 from home:alarrosa:branches:network
- Add patch to relax the openssl 3.x version check so that we
  don't identify a mismatch between released and pre-release
  versions as incompatible when we already identify the whole
  3.x versions as compatible (boo#1250115):
  * openssh-10.0p2-relax-openssl-version-check.patch
- Run some of the tests to check there are no regressions.

OBS-URL: https://build.opensuse.org/request/show/1306458
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=296
2025-09-22 11:57:41 +00:00
Hans Petter Jansson
de7e9eb432 Accepting request 1304675 from home:hpjansson:branches:network
- Update sshd@.service to match upstream more closely, to enable
  support for ephemeral sshd keys.
- Add openssh-9.6p1-pam-rhost.patch which fixes a performance issue
  where pam can do a reverse dns query of "UNKNOWN" which times out
  multiple times, causing a substantial slowdown when logging in
  (bsc#1249352).

OBS-URL: https://build.opensuse.org/request/show/1304675
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=295
2025-09-14 19:59:36 +00:00
Hans Petter Jansson
739aa15d50 Accepting request 1303317 from home:ldragon:branches:network
- Update sshd@.service to match upstream more closely, to enable support for ephemeral sshd keys
- add openssh-9.6p1-pam-rhost.patch which fixes a performance issue where pam can do a reverse dns query of "UNKNOWN" which times out multiple times, causing a substantial slowdown when logging in. (bsc#1249352)

OBS-URL: https://build.opensuse.org/request/show/1303317
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=294
2025-09-10 14:47:12 +00:00
3f765a9f36 Accepting request 1277186 from home:alarrosa:branches:network:openssh
- Enable --with-logind to call the SetTTY dbus method in systemd
  in SLE15 too. This allows "wall" to print messages in ssh ttys
  (bsc#1239671)
- Small fixes to unref the dbus session when any error occurs:
  * logind_set_tty.patch

    forwarding is off by default in the client (bsc#1241012,
    CVE-2025-32728)

OBS-URL: https://build.opensuse.org/request/show/1277186
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=293
2025-05-13 15:12:56 +00:00
2a3b9467bf Accepting request 1271991 from home:hpjansson:branches:network
- Add openssh-send-extra-term-env.patch, which appends a few
  environment variables useful for terminal identification to the
  default send and accept lists.

OBS-URL: https://build.opensuse.org/request/show/1271991
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=291
2025-04-23 13:19:09 +00:00
d7c0e6582d Accepting request 1268307 from home:alarrosa:branches:network
- "Update" to openssh 10.0p2:
  - There was an issue during the packaging of 10.0p1 which made it
    identify itself as 10.0p2 so 10.0p1 is now considered identical
    to 10.0p2 and upstream won't release a separate 10.0p2 package.

OBS-URL: https://build.opensuse.org/request/show/1268307
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=288
2025-04-10 08:25:01 +00:00
5f4c611aa2 Accepting request 1268142 from home:alarrosa:branches:network
- Do not try to create /etc/ssh in sshd-gen-keys-start
  (bsc#1238191). sshd-gen-keys-start transitions to a SELinux
  domain that doesn't have the necessary permissions. Based on
  a SR by Johannes Segitz <jsegitz@suse.com>.

OBS-URL: https://build.opensuse.org/request/show/1268142
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=287
2025-04-09 11:17:47 +00:00
b8f5e88ace Accepting request 1268126 from home:alarrosa:branches:network
- Update to openssh 10.0p1:
  * No changes for askpass, see main package changelog for
    details.

- Update to openssh 10.0p1:
  = Potentially-incompatible changes
  * This release removes support for the weak DSA signature
    algorithm, completing the deprecation process that began in
    2015 (when DSA was disabled by default) and repeatedly warned
    over the last 12 months.
  * scp(1), sftp(1): pass "ControlMaster no" to ssh when invoked by
    scp & sftp. This disables implicit session creation by these
    tools when ControlMaster was set to yes/auto by configuration,
    which some users found surprising. This change will not prevent
    scp/sftp from using an existing multiplexing session if one had
    already been created. GHPR557
  * This release has the version number 10.0 and announces itself
    as "SSH-2.0-OpenSSH_10.0". Software that naively matches
    versions using patterns like "OpenSSH_1*" may be confused by
    this.
  * sshd(8): this release removes the code responsible for the
    user authentication phase of the protocol from the per-
    connection sshd-session binary to a new sshd-auth binary.
    Splitting this code into a separate binary ensures that the
    crucial pre-authentication attack surface has an entirely
    disjoint address space from the code used for the rest of the
    connection. It also yields a small runtime memory saving as the
    authentication code will be unloaded after the authentication
    phase completes. This change should be largely invisible to
    users, though some log messages may now come from "sshd-auth"

OBS-URL: https://build.opensuse.org/request/show/1268126
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=286
2025-04-09 10:49:15 +00:00
69ce3dda1b Accepting request 1255379 from home:hillwood:branches:network
- Disable seccomp_filter and rlimitsandbox sandbox for loongarch. 
  seccomp_filter and rlimitsandbox not supported on loongarch64 yet.

OBS-URL: https://build.opensuse.org/request/show/1255379
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=285
2025-04-07 10:00:08 +00:00
e0df6f2027 Accepting request 1246973 from home:alarrosa:branches:network:openssh
- merge openssh-fips into the main openssh package (bsc#1185116)

OBS-URL: https://build.opensuse.org/request/show/1246973
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=284
2025-02-19 09:31:07 +00:00
f339972869 Accepting request 1246611 from home:alarrosa:branches:openssh-9.9
- Update to openssh 9.9p2:
  = Security
  * Fix CVE-2025-26465 - ssh(1) in OpenSSH versions 6.8p1 to 9.9p1
    (inclusive) contained a logic error that allowed an on-path
    attacker (a.k.a MITM) to impersonate any server when the
    VerifyHostKeyDNS option is enabled. This option is off by
    default.
  * Fix CVE-2025-26466 - sshd(8) in OpenSSH versions 9.5p1 to 9.9p1
    (inclusive) is vulnerable to a memory/CPU denial-of-service
    related to the handling of SSH2_MSG_PING packets. This
    condition may be mitigated using the existing
    PerSourcePenalties feature.
  Both vulnerabilities were discovered and demonstrated to be
  exploitable by the Qualys Security Advisory team. The openSSH
  team thanks them for their detailed review of OpenSSH.
  = Bugfixes
  * ssh(1), sshd(8): fix regression in Match directive that caused
    failures when predicates and their arguments were separated by
    '=' characters instead of whitespace (bz3739).
  * sshd(8): fix the "Match invalid-user" predicate, which was
    matching incorrectly in the initial pass of config evaluation.
  * ssh(1), sshd(8), ssh-keyscan(1): fix mlkem768x25519-sha256 key
    exchange on big-endian systems.
  * Fix a number of build problems on particular operating systems
    and configurations.
- Remove patches that are already included in 9.9p2:
  * 0001-fix-utmpx-ifdef.patch
  * 0002-upstream-fix-regression-introduced-when-I-switched-the-Match.patch
  * 0003-upstream-fix-previous-change-to-ssh_config-Match_-which-broken-on.patch
  * 0004-upstream-fix-ML-KEM768x25519-KEX-on-big-endian-systems-spotted-by.patch

OBS-URL: https://build.opensuse.org/request/show/1246611
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=283
2025-02-18 09:56:28 +00:00
22f1706ec3 Accepting request 1246591 from home:alarrosa:branches:openssh-9.9
- Fix a MitM attack against OpenSSH's VerifyHostKeyDNS-enabled
  client and a DoS attack against OpenSSH's client and server
  (bsc#1237040, CVE-2025-26465, bsc#1237041, CVE-2025-26466):
  * fix-CVE-2025-26465-and-CVE-2025-26466.patch

OBS-URL: https://build.opensuse.org/request/show/1246591
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=282
2025-02-18 09:10:29 +00:00
add4626a51 Accepting request 1239575 from home:dimstar:Factory
- Drop rcFOO symlinks for CODE16 (PED-266).

OBS-URL: https://build.opensuse.org/request/show/1239575
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=281
2025-02-10 11:55:37 +00:00
051e180f88 Accepting request 1218787 from home:alarrosa:branches:network:openssh
- Don't force using gcc11 on SLFO/ALP which have a newer version.

OBS-URL: https://build.opensuse.org/request/show/1218787
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=280
2024-10-28 11:22:01 +00:00
2c8525e1db Accepting request 1218784 from home:alarrosa:branches:network:openssh
- Add patches from upstream:
  - To fix a copy&paste oversight in an ifdef :
  * 0001-fix-utmpx-ifdef.patch
  - To fix a regression introduced when the "Match" criteria
    tokenizer was modified since it stopped supporting the
    "Match criteria=argument" format:
  * 0002-upstream-fix-regression-introduced-when-I-switched-the-Match.patch
  - To fix the previous patch which broke on negated Matches:
  * 0003-upstream-fix-previous-change-to-ssh_config-Match_-which-broken-on.patch
  - To fix the ML-KEM768x25519 kex algorithm on big-endian systems:
  * 0004-upstream-fix-ML-KEM768x25519-KEX-on-big-endian-systems-spotted-by.patch

OBS-URL: https://build.opensuse.org/request/show/1218784
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=279
2024-10-28 11:16:49 +00:00
ef827d0687 Accepting request 1207973 from home:alarrosa:branches:network:openssh
- Use %{with ...} instead of 0%{with ...}

OBS-URL: https://build.opensuse.org/request/show/1207973
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=278
2024-10-14 15:20:38 +00:00
2dc91d93a7 Accepting request 1207644 from home:alarrosa:branches:network:openssh
Updated the patch with a suggestion from upstream.

- Add a patch to fix a regression introduced in 9.6 that makes X11
  forwarding very slow. Submitted to upstream in
  https://bugzilla.mindrot.org/show_bug.cgi?id=3655#c4 . Fixes
  bsc#1229449:
  * fix-x11-regression-bsc1229449.patch
- Remove empty line at the end of sshd-sle.pamd (bsc#1227456)

OBS-URL: https://build.opensuse.org/request/show/1207644
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=277
2024-10-14 06:33:00 +00:00
fadb689fba Accepting request 1203549 from home:alarrosa:branches:network:openssh
- Add a const to the openssl 1.1/RSA section of sshkey_is_private
  to keep it similar to what it used before the 9.9 rebase:
  * openssh-8.1p1-audit.patch
- Add a openssl11 bcond to the spec file for the SLE12 case
  instead of checking suse_version in different parts.
- Move conditional patches to a number >= 1000.

OBS-URL: https://build.opensuse.org/request/show/1203549
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=276
2024-09-25 11:55:37 +00:00
b07c141055 Accepting request 1202729 from home:alarrosa:branches:network:openssh
- Update to openssh 9.9p1:
  * No changes for askpass, see main package changelog for
    details.

- Update to openssh 9.9p1:
  = Future deprecation notice
  * OpenSSH plans to remove support for the DSA signature algorithm
    in early 2025. This release disables DSA by default at compile
    time. DSA, as specified in the SSHv2 protocol, is inherently
    weak - being limited to a 160 bit private key and use of the
    SHA1 digest. Its estimated security level is only 80 bits
    symmetric equivalent.
    OpenSSH has disabled DSA keys by default since 2015 but has
    retained run-time optional support for them. DSA was the only
    mandatory-to-implement algorithm in the SSHv2 RFCs, mostly
    because alternative algorithms were encumbered by patents when
    the SSHv2 protocol was specified.
    This has not been the case for decades at this point and better
    algorithms are well supported by all actively-maintained SSH
    implementations. We do not consider the costs of maintaining
    DSA in OpenSSH to be justified and hope that removing it from
    OpenSSH can accelerate its wider deprecation in supporting
    cryptography libraries.
  = Potentially-incompatible changes
  * ssh(1): remove support for pre-authentication compression.
    OpenSSH has only supported post-authentication compression in
    the server for some years. Compression before authentication
    significantly increases the attack surface of SSH servers and
    risks creating oracles that reveal information about
    information sent during authentication.

OBS-URL: https://build.opensuse.org/request/show/1202729
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=275
2024-09-25 08:42:29 +00:00
a674f65c97 Accepting request 1200272 from home:alarrosa:branches:network:openssh
- Drop most of openssh-6.6p1-keycat.patch (actually, it was just
  commented out). The keycat binary isn't really installed nor
  supported, so we can drop it, except for the code that is used
  by other SELinux patches, which is what I kept from that patch
  (boo#1229072).
- Add patch submitted to upstream to fix RFC4256 implementation
  so that keyboard-interactive authentication method can send
  instructions and sshd shows them to users even before a prompt
  is requested. This fixes MFA push notifications (boo#1229010).
  * 0001-auth-pam-Immediately-report-instructions-to-clients-and-fix-handling-in-ssh-client.patch

OBS-URL: https://build.opensuse.org/request/show/1200272
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=274
2024-09-12 10:24:41 +00:00
1569d989cc Accepting request 1195723 from home:alarrosa:branches:network:openssh
- Add patch to fix sshd not logging in the audit failed login
  attempts (submitted to upstream in
  https://github.com/openssh/openssh-portable/pull/516):
  * fix-audit-fail-attempt.patch
- Use --enable-dsa-keys when building openssh. It's required if
  the user sets the crypto-policy mode to LEGACY, where DSA keys
  should be allowed. The option was added by upstream in 9.7 and
  set to disabled by default.
- These two changes fix 2 of the 3 issues reported in bsc#1229650.

OBS-URL: https://build.opensuse.org/request/show/1195723
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=273
2024-08-23 12:36:12 +00:00
06eb772e55 Accepting request 1193382 from home:alarrosa:branches:network:openssh-9.8
- Update to openssh 9.8p1:
  * No changes for askpass, see main package changelog for
    details.

- Fix a dbus connection leaked in the logind patch that was
  missing a sd_bus_unref call (found by Matthias Gerstner):
  * logind_set_tty.patch
- Add a patch that fixes a small memory leak when parsing the
  subsystem configuration option:
  * fix-memleak-in-process_server_config_line_depth.patch

- Update to openssh 9.8p1:
  = Security
  * 1) Race condition in sshd(8) (bsc#1226642, CVE-2024-6387).
    A critical vulnerability in sshd(8) was present in Portable
    OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may
    allow arbitrary code execution with root privileges.
    Successful exploitation has been demonstrated on 32-bit
    Linux/glibc systems with ASLR. Under lab conditions, the attack
    requires on average 6-8 hours of continuous connections up to
    the maximum the server will accept. Exploitation on 64-bit
    systems is believed to be possible but has not been
    demonstrated at this time. It's likely that these attacks will
    be improved upon.
    Exploitation on non-glibc systems is conceivable but has not
    been examined. Systems that lack ASLR or users of downstream
    Linux distributions that have modified OpenSSH to disable
    per-connection ASLR re-randomisation (yes - this is a thing, no
    - we don't understand why) may potentially have an easier path
    to exploitation. OpenBSD is not vulnerable.

OBS-URL: https://build.opensuse.org/request/show/1193382
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=272
2024-08-12 09:54:46 +00:00
23e8b1f01b Accepting request 1185821 from home:alarrosa:branches:network:openssh
- Add patch from upstream to fix proxy multiplexing mode:
  * 0001-upstream-fix-proxy-multiplexing-mode_-broken-when-keystroke.patch
- Add patch from upstream to restore correctly sigprocmask
  * 0001-upstream-correctly-restore-sigprocmask-around-ppoll.patch
- Add patch from upstream to fix a logic error in
  ObscureKeystrokeTiming that rendered this feature ineffective,
  allowing a passive observer to detect which network packets
  contained real keystrokes (bsc#1227318, CVE-2024-39894):
  * 0001-upstream-when-sending-ObscureKeystrokeTiming-chaff-packets_.patch

OBS-URL: https://build.opensuse.org/request/show/1185821
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=271
2024-07-05 19:01:36 +00:00
ccaaac730e Accepting request 1185775 from home:alarrosa:branches:network:openssh
- Add obsoletes for openssh-server-config-rootlogin since that
  package existed for a brief period of time during SLE 15 SP6/
  Leap 15.6 development but even if it was removed from the
  repositories before GM, some users might have it in their
  systems from having tried a beta/RC release (boo#1227350).

    quoting was present in the user-supplied ssh_config(5) directive
    (bsc#1218215, CVE-2023-51385).

OBS-URL: https://build.opensuse.org/request/show/1185775
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=270
2024-07-05 11:34:53 +00:00
c52d629a6f Accepting request 1184301 from home:alarrosa:branches:network:openssh
- Add patch to fix a race condition in a signal handler by removing
  the async-signal-unsafe code (CVE-2024-6387, bsc#1226642):
  * fix-CVE-2024-6387.patch

OBS-URL: https://build.opensuse.org/request/show/1184301
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=269
2024-07-01 11:50:15 +00:00
c3f8894285 Accepting request 1179619 from home:alarrosa:branches:network:openssh
- Add #include <stdlib.h> in some files added by the ldap patch to
  fix build with gcc14 (boo#1225904).
  * openssh-7.7p1-ldap.patch

OBS-URL: https://build.opensuse.org/request/show/1179619
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=268
2024-06-10 07:34:57 +00:00
f58c1dbe06 Accepting request 1174779 from home:alarrosa:branches:network:openssh-permit-root-login
- Remove the recommendation for openssh-server-config-rootlogin
  from openssh-server. Since the default for that config option
  was changed in SLE it's not needed anymore in SLE nor in TW
  (boo#1224392).

- Add a warning in %post of openssh-clients, openssh-server and 
  openssh-server-config-disallow-rootlogin to warn the user if
  the /etc/ssh/(ssh_config.d|sshd_config.d) directories are not
  being used (bsc#1223486).

OBS-URL: https://build.opensuse.org/request/show/1174779
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=267
2024-05-17 08:01:30 +00:00
d207717475 Accepting request 1173783 from home:alarrosa:branches:network:openssh-permit-root-login
- Only for SLE15, restore the patch file removed in
  Thu Feb 18 13:54:44 UTC 2021 to restore the previous behaviour
  from SP5 of having root password login allowed by default
  (fixes bsc#1223486, related to bsc#1173067):
  * openssh-7.7p1-allow_root_password_login.patch
- Since the default value for this config option is now set to
  permit root to use password logins in SLE15, the
  openssh-server-config-rootlogin subpackage isn't useful there so 
  we now create an openssh-server-config-disallow-rootlogin
  subpackage that sets the configuration the other way around
  than openssh-server-config-rootlogin.

OBS-URL: https://build.opensuse.org/request/show/1173783
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=266
2024-05-14 06:52:13 +00:00
ed2991b1b4 Accepting request 1167855 from home:alarrosa:branches:network
Add bugzilla reference to bsc#1221005

OBS-URL: https://build.opensuse.org/request/show/1167855
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=265
2024-04-15 17:00:32 +00:00
0f97d0afed Accepting request 1167816 from home:msmeissn:branches:network
- openssh-8.0p1-gssapi-keyex.patch: Added missing struct initializer,
  added missing parameter (bsc#1222840)

OBS-URL: https://build.opensuse.org/request/show/1167816
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=264
2024-04-15 15:41:38 +00:00
fa464f2e73 Accepting request 1167038 from home:alarrosa:branches:network
- Make openssh-server recommend the openssh-server-config-rootlogin
  package in SLE in order to keep the same behaviour of previous
  SPs where the PermitRootLogin default was set to yes.
- Fix crypto-policies requirement to be set by openssh-server, not
  the config-rootlogin subpackage.
- Add back %config(noreplace) tag for more config files that were
  already set like this in previous SPs.

OBS-URL: https://build.opensuse.org/request/show/1167038
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=263
2024-04-15 06:21:11 +00:00
3b71acee8a Accepting request 1166764 from home:Arnavion
- Fix duplicate loading of dropins. (boo#1222467)

OBS-URL: https://build.opensuse.org/request/show/1166764
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=262
2024-04-12 06:38:08 +00:00
8a6309e158 Accepting request 1166156 from home:alarrosa:branches:network
Add one more bsc/CVE reference

OBS-URL: https://build.opensuse.org/request/show/1166156
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=261
2024-04-08 11:15:17 +00:00
273aefa261 Accepting request 1165554 from home:alarrosa:branches:network
- Add missing bugzilla/CVE references to the changelog

OBS-URL: https://build.opensuse.org/request/show/1165554
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=260
2024-04-05 11:11:29 +00:00
21945dd5fd Accepting request 1165549 from home:alarrosa:branches:network2
- Add patch from SLE which was missing in Factory:
  * Mon Jun  7 20:54:09 UTC 2021 - Hans Petter Jansson <hpj@suse.com>
- Add openssh-mitigate-lingering-secrets.patch (bsc#1186673), which
  attempts to mitigate instances of secrets lingering in memory
  after a session exits. (bsc#1213004 bsc#1213008) 
- Rebase patch:
  * openssh-6.6p1-privsep-selinux.patch

OBS-URL: https://build.opensuse.org/request/show/1165549
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=259
2024-04-05 11:08:11 +00:00
e45206c30e Accepting request 1165438 from home:alarrosa:branches:network2
Forward a fix for a patch from SLE
   
- Rebase openssh-7.7p1-fips.patch (bsc#1221928) 
  Remove OPENSSL_HAVE_EVPGCM-ifdef, which is no longer supported by
  upstream

OBS-URL: https://build.opensuse.org/request/show/1165438
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=258
2024-04-05 07:57:21 +00:00
15e0cad22c Accepting request 1164145 from home:alarrosa:branches:network
- Use %config(noreplace) for sshd_config . In any case, it's
  recommended to drop a file in sshd_config.d instead of editing
  sshd_config (bsc#1221063)
- Use %{_libexecdir} when removing ssh-keycat instead of the
  hardcoded path so it works in TW and SLE.

OBS-URL: https://build.opensuse.org/request/show/1164145
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=257
2024-04-04 09:11:43 +00:00
53e179ceba Accepting request 1155471 from home:pmonrealgonzalez:branches:network
- Add crypto-policies support [bsc#1211301]
  * Add patches:
    - openssh-9.6p1-crypto-policies.patch
    - openssh-9.6p1-crypto-policies-man.patch

OBS-URL: https://build.opensuse.org/request/show/1155471
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=256
2024-04-04 09:11:25 +00:00
Hans Petter Jansson
7c8a6bddf5 Accepting request 1150500 from home:hpjansson:branches:network
- Update to openssh 9.6p1:
  * No changes for askpass, see main package changelog for
    details.

- Update to openssh 9.6p1:
  = Security
  * ssh(1), sshd(8): implement protocol extensions to thwart the
    so-called "Terrapin attack" discovered by Fabian Bäumer, Marcus
    Brinkmann and Jörg Schwenk. This attack allows a MITM to effect a
    limited break of the integrity of the early encrypted SSH transport
    protocol by sending extra messages prior to the commencement of
    encryption, and deleting an equal number of consecutive messages
    immediately after encryption starts. A peer SSH client/server
    would not be able to detect that messages were deleted.
  * ssh-agent(1): when adding PKCS#11-hosted private keys while
    specifying destination constraints, if the PKCS#11 token returned
    multiple keys then only the first key had the constraints applied.
    Use of regular private keys, FIDO tokens and unconstrained keys
    are unaffected.
  * ssh(1): if an invalid user or hostname that contained shell
    metacharacters was passed to ssh(1), and a ProxyCommand,
    LocalCommand directive or "match exec" predicate referenced the
    user or hostname via %u, %h or similar expansion token, then
    an attacker who could supply arbitrary user/hostnames to ssh(1)
    could potentially perform command injection depending on what
    quoting was present in the user-supplied ssh_config(5) directive.
  = Potentially incompatible changes
  * ssh(1), sshd(8): the RFC4254 connection/channels protocol provides
    a TCP-like window mechanism that limits the amount of data that
    can be sent without acceptance from the peer. In cases where this

OBS-URL: https://build.opensuse.org/request/show/1150500
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=255
2024-02-25 18:43:17 +00:00
Hans Petter Jansson
2767650684 Accepting request 1133932 from home:hpjansson:branches:network
Added openssh-cve-2023-48795.patch

OBS-URL: https://build.opensuse.org/request/show/1133932
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=254
2023-12-19 01:54:09 +00:00
Hans Petter Jansson
fe72846048 Accepting request 1113799 from home:kukuk:branches:network
- Disable SLP by default for Factory and ALP (bsc#1214884)

OBS-URL: https://build.opensuse.org/request/show/1113799
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=253
2023-12-19 01:39:20 +00:00
Hans Petter Jansson
6a290fb675 Accepting request 1123220 from home:jsegitz:branches:network
- Enhanced SELinux functionality. Added Fedora patches:
  * openssh-7.8p1-role-mls.patch
    Proper handling of MLS systems and basis for other SELinux
    improvements
  * openssh-6.6p1-privsep-selinux.patch
    Properly set contexts during privilege separation
  * openssh-6.6p1-keycat.patch
    Add ssh-keycat command to allow retrival of authorized_keys
    on MLS setups with polyinstantiation
  * openssh-6.6.1p1-selinux-contexts.patch
    Additional changes to set the proper context during privilege 
    separation
  * openssh-7.6p1-cleanup-selinux.patch
    Various changes and putting the pieces together
  For now we don't ship the ssh-keycat command, but we need the patch
  for the other SELinux infrastructure
  This change fixes issues like bsc#1214788, where the ssh daemon 
  needs to act on behalf of a user and needs a proper context for this

OBS-URL: https://build.opensuse.org/request/show/1123220
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=252
2023-11-28 16:35:34 +00:00
0e2df13c98 Accepting request 1119952 from home:dimstar:Factory
- Add cb4ed12f.patch: Fix build using zlib 1.3. The check expected
  a version in the form a.b.c[.d], which no longer matches 1.3.

See failure with zlib 1.3 in Staging:N

OBS-URL: https://build.opensuse.org/request/show/1119952
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=251
2023-10-25 07:33:22 +00:00
Hans Petter Jansson
6d7a1ac80a Accepting request 1110800 from home:kukuk:no-utmp
Teach openssh to tell logind the TTY, else tools like wall will stop working now with the new systemd v254 and util-linux (and who, w, ... will not show a tty)

OBS-URL: https://build.opensuse.org/request/show/1110800
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=250
2023-09-18 22:02:17 +00:00
39c593397f Accepting request 1099810 from home:simotek:branches:network
- Update to openssh 9.3p2
  * No changes for askpass, see main package changelog for
    details
- Update to openssh 9.3p2 (bsc#1213504, CVE-2023-38408):
  Security
  ========
  Fix CVE-2023-38408 - a condition where specific libaries loaded via
  ssh-agent(1)'s PKCS#11 support could be abused to achieve remote
  code execution via a forwarded agent socket if the following
  conditions are met:
  * Exploitation requires the presence of specific libraries on
    the victim system.
  * Remote exploitation requires that the agent was forwarded
    to an attacker-controlled system.
  Exploitation can also be prevented by starting ssh-agent(1) with an
  empty PKCS#11/FIDO allowlist (ssh-agent -P '') or by configuring
  an allowlist that contains only specific provider libraries.
  This vulnerability was discovered and demonstrated to be exploitable
  by the Qualys Security Advisory team. 
 
  In addition to removing the main precondition for exploitation,
  this release removes the ability for remote ssh-agent(1) clients
  to load PKCS#11 modules by default (see below).
  Potentially-incompatible changes
  --------------------------------
   * ssh-agent(8): the agent will now refuse requests to load PKCS#11
     modules issued by remote clients by default. A flag has been added
     to restore the previous behaviour "-Oallow-remote-pkcs11".
     Note that ssh-agent(8) depends on the SSH client to identify
     requests that are remote. The OpenSSH >=8.9 ssh(1) client does
     this, but forwarding access to an agent socket using other tools
     may circumvent this restriction.

OBS-URL: https://build.opensuse.org/request/show/1099810
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=249
2023-07-21 07:35:33 +00:00
Hans Petter Jansson
c49a265e6d Accepting request 1087770 from home:alarrosa:branches:network
- Update to openssh 9.3p1
  * No changes for askpass, see main package changelog for
    details

- Update to openssh 9.3p1:
  = Security
  * ssh-add(1): when adding smartcard keys to ssh-agent(1) with the
   per-hop destination constraints (ssh-add -h ...) added in
   OpenSSH 8.9, a logic error prevented the constraints from being
   communicated to the agent. This resulted in the keys being added
   without constraints. The common cases of non-smartcard keys and
   keys without destination constraints are unaffected. This
   problem was reported by Luci Stanescu.
 * ssh(1): Portable OpenSSH provides an implementation of the
   getrrsetbyname(3) function if the standard library does not
   provide it, for use by the VerifyHostKeyDNS feature. A
   specifically crafted DNS response could cause this function to
   perform an out-of-bounds read of adjacent stack data, but this
   condition does not appear to be exploitable beyond denial-of-
   service to the ssh(1) client.
   The getrrsetbyname(3) replacement is only included if the
   system's standard library lacks this function and portable
   OpenSSH was not compiled with the ldns library (--with-ldns).
   getrrsetbyname(3) is only invoked if using VerifyHostKeyDNS to
   fetch SSHFP records. This problem was found by the Coverity
   static analyzer.
  = New features
  * ssh-keygen(1), ssh-keyscan(1): accept -Ohashalg=sha1|sha256
    when outputting SSHFP fingerprints to allow algorithm
    selection. bz3493

OBS-URL: https://build.opensuse.org/request/show/1087770
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=247
2023-05-22 19:32:26 +00:00
Hans Petter Jansson
7939cc3cee Accepting request 1074609 from home:kukuk:branches:network
- Rename sshd.pamd to sshd-sle.pamd and fix order of pam_keyinit
- Add new sshd.pamd including postlogin-* config files

OBS-URL: https://build.opensuse.org/request/show/1074609
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=246
2023-04-13 21:23:05 +00:00
64f62c8348 Accepting request 1065922 from home:kukuk:branches:network
- Remove BuildRequires for libtirpc, we don't use it
- Remove pam_lastlog from sshd PAM config. sshd is doing the same,
  too, which leads to e.g. duplicate entries in wtmp [bsc#1208243]

OBS-URL: https://build.opensuse.org/request/show/1065922
OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=245
2023-03-26 16:59:52 +00:00