Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
aports
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Model registry
Monitor
Service Desk
Analyze
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
alpine
aports
Commits
039edbba
Unverified
Commit
039edbba
authored
1 month ago
by
achill (fossdd)
Browse files
Options
Downloads
Patches
Plain Diff
main/openssh: patch CVE-2025-26465 & CVE-2025-26466
parent
d2e5ad79
No related branches found
No related tags found
1 merge request
!80242
[3.19] main/openssh: patch CVE-2025-26465 & CVE-2025-26466
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
main/openssh/APKBUILD
+8
-1
8 additions, 1 deletion
main/openssh/APKBUILD
main/openssh/CVE-2025-26465.patch
+158
-0
158 additions, 0 deletions
main/openssh/CVE-2025-26465.patch
main/openssh/CVE-2025-26466.patch
+34
-0
34 additions, 0 deletions
main/openssh/CVE-2025-26466.patch
with
200 additions
and
1 deletion
main/openssh/APKBUILD
+
8
−
1
View file @
039edbba
...
...
@@ -5,7 +5,7 @@
pkgname
=
openssh
pkgver
=
9.6_p1
_myver
=
${
pkgver
%_*
}${
pkgver
#*_
}
pkgrel
=
1
pkgrel
=
2
pkgdesc
=
"Port of OpenBSD's free SSH release"
url
=
"https://www.openssh.com/portable.html"
arch
=
"all"
...
...
@@ -58,6 +58,8 @@ source="https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-$_myver.tar
zero-call-used-regs_all.patch
CVE-2024-6387.patch
ObscureKeystrokeTiming.patch
CVE-2025-26465.patch
CVE-2025-26466.patch
sshd.initd
sshd.confd
...
...
@@ -65,6 +67,9 @@ source="https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-$_myver.tar
"
# secfixes:
# 9.7_p2-r5:
# - CVE-2025-26465
# - CVE-2025-26466
# 9.6_p1-r1:
# - CVE-2024-6387
# 9.6_p1-r0:
...
...
@@ -306,6 +311,8 @@ ff73563e6018e94a1b2dd320cf32426f3945c0f4aa509eeb95783c34dd5c5c8dec91f6d71e4d538c
6ad86c821e13f6058434eb7f685dfb9073441fc29e29ba080c67a1f3859d0dd1bac0bbaacc3a2245f8e1cc039f0a578ed48450ea6f80046054897496cbcaf7eb zero-call-used-regs_all.patch
f84f7aec9576de2d9ca058e05e8fa29fc5b47a0534e4067b632ba294d5b42e5b8b05a61aed3f547a472a0215926a439ce02fd5ff8f07ee2a8f68e5fefbdd750f CVE-2024-6387.patch
0476bb73073b5b05f1608ef625e2f84446e386d06480b673a69b3eb1c9b0622f9c937f45bdb16a315570391603a093e9f23a3d5149d41d06e5a428b8c098c20d ObscureKeystrokeTiming.patch
7a394f6d85da1351d1f4b3ff7c78256dd2ffb7c6c0f5e494dbd44c2d892f2f445c2acf13df161653632c01a6dcf6bed8403c25b70cd2badb5ea5fc6cd77521a3 CVE-2025-26465.patch
f6da1bcff445063cfbfa273d352f3eed235a94380bc0d8b5e8bc37815be5016e46e2eea4a25d2d33649ec7235e7c5a0e79458a5b5c505f7ea888c7c4bdf8c043 CVE-2025-26466.patch
2cab1b844d4efb53f848308b4aaedbe74888d2e85bcb2e4dfdae7c18ac3ecea707829072a4276fbe90dfe2f537bbf48127d96f29ec5154e96c0bfb7437910d53 sshd.initd
be7dd5f6d319b2e03528525a66a58310d43444606713786b913a17a0fd9311869181d0fb7927a185d71d392674857dea3c97b6b8284886227d47b36193471a09 sshd.confd
5d3b62d724d930bafb6263d0600828771e667751cb5ba5070414dce7c3d0559bebdfb05960b721cfd20c81d3ad824291ffb10498798171c8bbbcbf389b706265 sshd.pam
...
...
This diff is collapsed.
Click to expand it.
main/openssh/CVE-2025-26465.patch
0 → 100644
+
158
−
0
View file @
039edbba
Patch-Source: https://github.com/openssh/openssh-portable/commit/0832aac79517611dd4de93ad0a83577994d9c907
(without $OpenBSD comments)
---
From 0832aac79517611dd4de93ad0a83577994d9c907 Mon Sep 17 00:00:00 2001
From: "djm@openbsd.org" <djm@openbsd.org>
Date: Tue, 18 Feb 2025 08:02:48 +0000
Subject: [PATCH] upstream: Fix cases where error codes were not correctly set
Reported by the Qualys Security Advisory team. ok markus@
OpenBSD-Commit-ID: 7bcd4ffe0fa1e27ff98d451fb9c22f5fae6e610d
---
krl.c | 4 +++-
ssh-agent.c | 7 ++++++-
ssh-sk-client.c | 4 +++-
sshconnect2.c | 7 +++++--
sshsig.c | 3 ++-
5 files changed, 19 insertions(+), 6 deletions(-)
diff --git a/krl.c b/krl.c
index e2efdf0667a7..0d0f69534182 100644
--- a/krl.c
+++ b/krl.c
@@ -674,6 +674,7 @@
revoked_certs_generate(struct revoked_certs *rc, struct sshbuf *buf)
break;
case KRL_SECTION_CERT_SERIAL_BITMAP:
if (rs->lo - bitmap_start > INT_MAX) {
+ r = SSH_ERR_INVALID_FORMAT;
error_f("insane bitmap gap");
goto out;
}
@@ -1059,6 +1060,7 @@
ssh_krl_from_blob(struct sshbuf *buf, struct ssh_krl **krlp)
}
if ((krl = ssh_krl_init()) == NULL) {
+ r = SSH_ERR_ALLOC_FAIL;
error_f("alloc failed");
goto out;
}
diff --git a/ssh-agent.c b/ssh-agent.c
index 48973b2c142a..c27c5a956f2c 100644
--- a/ssh-agent.c
+++ b/ssh-agent.c
@@ -1220,6 +1220,7 @@
parse_key_constraint_extension(struct sshbuf *m, char **sk_providerp,
"restrict-destination-v00@openssh.com") == 0) {
if (*dcsp != NULL) {
error_f("%s already set", ext_name);
+ r = SSH_ERR_INVALID_FORMAT;
goto out;
}
if ((r = sshbuf_froms(m, &b)) != 0) {
@@ -1229,6 +1230,7 @@
parse_key_constraint_extension(struct sshbuf *m, char **sk_providerp,
while (sshbuf_len(b) != 0) {
if (*ndcsp >= AGENT_MAX_DEST_CONSTRAINTS) {
error_f("too many %s constraints", ext_name);
+ r = SSH_ERR_INVALID_FORMAT;
goto out;
}
*dcsp = xrecallocarray(*dcsp, *ndcsp, *ndcsp + 1,
@@ -1246,6 +1248,7 @@
parse_key_constraint_extension(struct sshbuf *m, char **sk_providerp,
}
if (*certs != NULL) {
error_f("%s already set", ext_name);
+ r = SSH_ERR_INVALID_FORMAT;
goto out;
}
if ((r = sshbuf_get_u8(m, &v)) != 0 ||
@@ -1257,6 +1260,7 @@
parse_key_constraint_extension(struct sshbuf *m, char **sk_providerp,
while (sshbuf_len(b) != 0) {
if (*ncerts >= AGENT_MAX_EXT_CERTS) {
error_f("too many %s constraints", ext_name);
+ r = SSH_ERR_INVALID_FORMAT;
goto out;
}
*certs = xrecallocarray(*certs, *ncerts, *ncerts + 1,
@@ -1757,6 +1761,7 @@
process_ext_session_bind(SocketEntry *e)
/* record new key/sid */
if (e->nsession_ids >= AGENT_MAX_SESSION_IDS) {
error_f("too many session IDs recorded");
+ r = -1;
goto out;
}
e->session_ids = xrecallocarray(e->session_ids, e->nsession_ids,
diff --git a/ssh-sk-client.c b/ssh-sk-client.c
index 321fe53a2d91..06fad22134fb 100644
--- a/ssh-sk-client.c
+++ b/ssh-sk-client.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-sk-client.c,v 1.12 2022/01/14 03:34:00 djm Exp $ */
+/* $OpenBSD: ssh-sk-client.c,v 1.13 2025/02/18 08:02:48 djm Exp $ */
/*
* Copyright (c) 2019 Google LLC
*
@@ -439,6 +439,7 @@
sshsk_load_resident(const char *provider_path, const char *device,
}
if ((srk = calloc(1, sizeof(*srk))) == NULL) {
error_f("calloc failed");
+ r = SSH_ERR_ALLOC_FAIL;
goto out;
}
srk->key = key;
@@ -450,6 +451,7 @@
sshsk_load_resident(const char *provider_path, const char *device,
if ((tmp = recallocarray(srks, nsrks, nsrks + 1,
sizeof(*srks))) == NULL) {
error_f("recallocarray keys failed");
+ r = SSH_ERR_ALLOC_FAIL;
goto out;
}
debug_f("srks[%zu]: %s %s uidlen %zu", nsrks,
diff --git a/sshconnect2.c b/sshconnect2.c
index a69c4da18773..1ee6000ab0cc 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -99,7 +99,7 @@
verify_host_key_callback(struct sshkey *hostkey, struct ssh *ssh)
options.required_rsa_size)) != 0)
fatal_r(r, "Bad server host key");
if (verify_host_key(xxx_host, xxx_hostaddr, hostkey,
- xxx_conn_info) == -1)
+ xxx_conn_info) != 0)
fatal("Host key verification failed.");
return 0;
}
@@ -699,6 +699,7 @@
input_userauth_pk_ok(int type, u_int32_t seq, struct ssh *ssh)
if ((pktype = sshkey_type_from_name(pkalg)) == KEY_UNSPEC) {
debug_f("server sent unknown pkalg %s", pkalg);
+ r = SSH_ERR_INVALID_FORMAT;
goto done;
}
if ((r = sshkey_from_blob(pkblob, blen, &key)) != 0) {
@@ -709,6 +710,7 @@
input_userauth_pk_ok(int type, u_int32_t seq, struct ssh *ssh)
error("input_userauth_pk_ok: type mismatch "
"for decoded key (received %d, expected %d)",
key->type, pktype);
+ r = SSH_ERR_INVALID_FORMAT;
goto done;
}
@@ -728,6 +730,7 @@
input_userauth_pk_ok(int type, u_int32_t seq, struct ssh *ssh)
SSH_FP_DEFAULT);
error_f("server replied with unknown key: %s %s",
sshkey_type(key), fp == NULL ? "<ERROR>" : fp);
+ r = SSH_ERR_INVALID_FORMAT;
goto done;
}
ident = format_identity(id);
diff --git a/sshsig.c b/sshsig.c
index 6e03c0b06d85..3da005d621f9 100644
--- a/sshsig.c
+++ b/sshsig.c
@@ -879,6 +879,7 @@
cert_filter_principals(const char *path, u_long linenum,
}
if ((principals = sshbuf_dup_string(nprincipals)) == NULL) {
error_f("buffer error");
+ r = SSH_ERR_ALLOC_FAIL;
goto out;
}
/* success */
This diff is collapsed.
Click to expand it.
main/openssh/CVE-2025-26466.patch
0 → 100644
+
34
−
0
View file @
039edbba
Patch-Source: https://github.com/openssh/openssh-portable/commit/6ce00f0c2ecbb9f75023dbe627ee6460bcec78c2
(without $OpenBSD comments)
---
From 6ce00f0c2ecbb9f75023dbe627ee6460bcec78c2 Mon Sep 17 00:00:00 2001
From: "djm@openbsd.org" <djm@openbsd.org>
Date: Tue, 18 Feb 2025 08:02:12 +0000
Subject: [PATCH] upstream: Don't reply to PING in preauth phase or during KEX
Reported by the Qualys Security Advisory team. ok markus@
OpenBSD-Commit-ID: c656ac4abd1504389d1733d85152044b15830217
---
packet.c | 10 +++++++++-
1 file changed, 9 insertions(+), 1 deletion(-)
diff --git a/packet.c b/packet.c
index 486f8515746e..9dea2cfc5188 100644
--- a/packet.c
+++ b/packet.c
@@ -1864,6 +1864,14 @@
ssh_packet_read_poll_seqnr(struct ssh *ssh, u_char *typep, u_int32_t *seqnr_p)
if ((r = sshpkt_get_string_direct(ssh, &d, &len)) != 0)
return r;
DBG(debug("Received SSH2_MSG_PING len %zu", len));
+ if (!ssh->state->after_authentication) {
+ DBG(debug("Won't reply to PING in preauth"));
+ break;
+ }
+ if (ssh_packet_is_rekeying(ssh)) {
+ DBG(debug("Won't reply to PING during KEX"));
+ break;
+ }
if ((r = sshpkt_start(ssh, SSH2_MSG_PONG)) != 0 ||
(r = sshpkt_put_string(ssh, d, len)) != 0 ||
(r = sshpkt_send(ssh)) != 0)
This diff is collapsed.
Click to expand it.
Andrew Crenshaw
@crenshawat
mentioned in issue
#16929 (closed)
·
1 month ago
mentioned in issue
#16929 (closed)
mentioned in issue #16929
Toggle commit list
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment