forked from pool/openssh
03fc1a6def
- Update to openssh 9.3p1 * No changes for askpass, see main package changelog for details - Update to openssh 9.3p1: = Security * ssh-add(1): when adding smartcard keys to ssh-agent(1) with the per-hop destination constraints (ssh-add -h ...) added in OpenSSH 8.9, a logic error prevented the constraints from being communicated to the agent. This resulted in the keys being added without constraints. The common cases of non-smartcard keys and keys without destination constraints are unaffected. This problem was reported by Luci Stanescu. * ssh(1): Portable OpenSSH provides an implementation of the getrrsetbyname(3) function if the standard library does not provide it, for use by the VerifyHostKeyDNS feature. A specifically crafted DNS response could cause this function to perform an out-of-bounds read of adjacent stack data, but this condition does not appear to be exploitable beyond denial-of- service to the ssh(1) client. The getrrsetbyname(3) replacement is only included if the system's standard library lacks this function and portable OpenSSH was not compiled with the ldns library (--with-ldns). getrrsetbyname(3) is only invoked if using VerifyHostKeyDNS to fetch SSHFP records. This problem was found by the Coverity static analyzer. = New features * ssh-keygen(1), ssh-keyscan(1): accept -Ohashalg=sha1|sha256 when outputting SSHFP fingerprints to allow algorithm selection. bz3493 OBS-URL: https://build.opensuse.org/request/show/1087770 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=247
35 lines
927 B
Diff
35 lines
927 B
Diff
Index: openssh-8.8p1/sandbox-seccomp-filter.c
|
|
===================================================================
|
|
--- openssh-8.8p1.orig/sandbox-seccomp-filter.c
|
|
+++ openssh-8.8p1/sandbox-seccomp-filter.c
|
|
@@ -201,6 +201,9 @@ static const struct sock_filter preauth_
|
|
#ifdef __NR_close
|
|
SC_ALLOW(__NR_close),
|
|
#endif
|
|
+#ifdef __NR_close_range
|
|
+ SC_ALLOW(__NR_close_range),
|
|
+#endif
|
|
#ifdef __NR_exit
|
|
SC_ALLOW(__NR_exit),
|
|
#endif
|
|
@@ -213,6 +216,9 @@ static const struct sock_filter preauth_
|
|
#ifdef __NR_futex_time64
|
|
SC_FUTEX(__NR_futex_time64),
|
|
#endif
|
|
+#ifdef __NR_futex_time64
|
|
+ SC_ALLOW(__NR_futex_time64),
|
|
+#endif
|
|
#ifdef __NR_geteuid
|
|
SC_ALLOW(__NR_geteuid),
|
|
#endif
|
|
@@ -293,6 +299,9 @@ static const struct sock_filter preauth_
|
|
#endif
|
|
#ifdef __NR_pselect6_time64
|
|
SC_ALLOW(__NR_pselect6_time64),
|
|
+#endif
|
|
+#ifdef __NR_pselect6_time64
|
|
+ SC_ALLOW(__NR_pselect6_time64),
|
|
#endif
|
|
#ifdef __NR_read
|
|
SC_ALLOW(__NR_read),
|