Antonio Larrosa d77e0c9092 - Update to openssh 9.9p2:
= Security
  * Fix CVE-2025-26465 - ssh(1) in OpenSSH versions 6.8p1 to 9.9p1
    (inclusive) contained a logic error that allowed an on-path
    attacker (a.k.a MITM) to impersonate any server when the
    VerifyHostKeyDNS option is enabled. This option is off by
    default.
  * Fix CVE-2025-26466 - sshd(8) in OpenSSH versions 9.5p1 to 9.9p1
    (inclusive) is vulnerable to a memory/CPU denial-of-service
    related to the handling of SSH2_MSG_PING packets. This
    condition may be mitigated using the existing
    PerSourcePenalties feature.
  Both vulnerabilities were discovered and demonstrated to be
  exploitable by the Qualys Security Advisory team. The openSSH
  team thanks them for their detailed review of OpenSSH.
  = Bugfixes
  * ssh(1), sshd(8): fix regression in Match directive that caused
    failures when predicates and their arguments were separated by
    '=' characters instead of whitespace (bz3739).
  * sshd(8): fix the "Match invalid-user" predicate, which was
    matching incorrectly in the initial pass of config evaluation.
  * ssh(1), sshd(8), ssh-keyscan(1): fix mlkem768x25519-sha256 key
    exchange on big-endian systems.
  * Fix a number of build problems on particular operating systems
    and configurations.
- Remove patches that are already included in 9.9p2:
  * 0001-fix-utmpx-ifdef.patch
  * 0002-upstream-fix-regression-introduced-when-I-switched-the-Match.patch
  * 0003-upstream-fix-previous-change-to-ssh_config-Match_-which-broken-on.patch
  * 0004-upstream-fix-ML-KEM768x25519-KEX-on-big-endian-systems-spotted-by.patch

OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=283
2025-02-18 09:56:28 +00:00
2025-02-18 09:56:28 +00:00
2025-02-18 09:56:28 +00:00

There are following changes in default settings of ssh client and server:

* Accepting and sending of locale environment variables in protocol 2 is
  enabled.

* PAM authentication is enabled and mostly even required, do not turn it off.

* In SLE15, root authentiation with password is enabled by default
  (PermitRootLogin yes).
  NOTE: this has security implications and is only done in order to not change
  behaviour of the server in an update. We strongly suggest setting this option
  either "prohibit-password" or even better to "no" (which disables direct
  remote root login entirely).

* DSA authentication is enabled by default for maximum compatibility.
  NOTE: do not use DSA authentication since it is being phased out for a reason
  - the size of DSA keys is limited by the standard to 1024 bits which cannot
  be considered safe any more.

* Accepting all RFC4419 specified DH group parameters. See KexDHMin in
  ssh_config and sshd_config manual pages.

For more information on differences in SUSE OpenSSH package see README.FIPS
Description
No description provided
Readme 8.5 MiB
Languages
Perl 88.5%
Shell 11.5%