summaryrefslogtreecommitdiff
path: root/security/openssh
diff options
context:
space:
mode:
authortaca <taca>2015-07-30 03:20:36 +0000
committertaca <taca>2015-07-30 03:20:36 +0000
commitf939c218812618ffaaed3aadb6aaf4bd497e48c7 (patch)
tree8718949aa13fc8f5b692efc391d374bce1e376e6 /security/openssh
parentae01b09a34fe5bb5cf392ee486f23fa96a8c9b06 (diff)
downloadpkgsrc-f939c218812618ffaaed3aadb6aaf4bd497e48c7.tar.gz
Add fix for CVE-2015-5600 from FreeBSD via NetBSD base.
Bump PKGREVISION.
Diffstat (limited to 'security/openssh')
-rw-r--r--security/openssh/Makefile3
-rw-r--r--security/openssh/distinfo3
-rw-r--r--security/openssh/patches/patch-auth2-chall.c32
3 files changed, 36 insertions, 2 deletions
diff --git a/security/openssh/Makefile b/security/openssh/Makefile
index df2be515d62..c2e49ec1411 100644
--- a/security/openssh/Makefile
+++ b/security/openssh/Makefile
@@ -1,7 +1,8 @@
-# $NetBSD: Makefile,v 1.233 2015/07/09 16:14:23 taca Exp $
+# $NetBSD: Makefile,v 1.234 2015/07/30 03:20:36 taca Exp $
DISTNAME= openssh-6.9p1
PKGNAME= openssh-6.9.1
+PKGREVISION= 1
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_OPENBSD:=OpenSSH/portable/}
diff --git a/security/openssh/distinfo b/security/openssh/distinfo
index 337eec84a55..e0a13b26197 100644
--- a/security/openssh/distinfo
+++ b/security/openssh/distinfo
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.93 2015/07/10 07:00:29 dsainty Exp $
+$NetBSD: distinfo,v 1.94 2015/07/30 03:20:36 taca Exp $
SHA1 (openssh-6.9p1-hpn-20150709.diff.gz) = a39571c1cdb13382631a1d9cfe89b82fb346c92c
RMD160 (openssh-6.9p1-hpn-20150709.diff.gz) = 8bb077e7ecbc7550386a050209e84d6f4d895788
@@ -11,6 +11,7 @@ SHA1 (patch-auth-passwd.c) = 32da596dd9b255ffdd8168e6ea6f62596304b116
SHA1 (patch-auth-rhosts.c) = 5752c384f1fd81ed6ef21707fa2b9743a3891987
SHA1 (patch-auth.c) = 80f1c5ad8ea01a3c9dedce4eef1b625640958450
SHA1 (patch-auth1.c) = 0bb4bc35e2ca2cd03c5596dadcd2ffb4329091a7
+SHA1 (patch-auth2-chall.c) = 9edd679fc0a1d128786cea8939e804adb400c3c9
SHA1 (patch-auth2.c) = 831139b9cdbd9b4d3429ea1aba176daf78be3405
SHA1 (patch-channels.c) = 9ad160fd1c2c7fabbea3d49dacb36036d13adfaa
SHA1 (patch-clientloop.c) = 11d44815ec39030ae20cb75727acff8c8e91144e
diff --git a/security/openssh/patches/patch-auth2-chall.c b/security/openssh/patches/patch-auth2-chall.c
new file mode 100644
index 00000000000..4bd9a792f10
--- /dev/null
+++ b/security/openssh/patches/patch-auth2-chall.c
@@ -0,0 +1,32 @@
+$NetBSD: patch-auth2-chall.c,v 1.1 2015/07/30 03:20:36 taca Exp $
+
+Fix for CVE-2015-5600 from FreeBSD via NetBSD base.
+
+--- auth2-chall.c.orig 2015-07-01 02:35:31.000000000 +0000
++++ auth2-chall.c
+@@ -83,6 +83,7 @@ struct KbdintAuthctxt
+ void *ctxt;
+ KbdintDevice *device;
+ u_int nreq;
++ u_int devices_done;
+ };
+
+ #ifdef USE_PAM
+@@ -169,11 +170,15 @@ kbdint_next_device(Authctxt *authctxt, K
+ if (len == 0)
+ break;
+ for (i = 0; devices[i]; i++) {
+- if (!auth2_method_allowed(authctxt,
++ if ((kbdintctxt->devices_done & (1 << i)) != 0 ||
++ !auth2_method_allowed(authctxt,
+ "keyboard-interactive", devices[i]->name))
+ continue;
+- if (strncmp(kbdintctxt->devices, devices[i]->name, len) == 0)
++ if (strncmp(kbdintctxt->devices, devices[i]->name,
++ len) == 0) {
+ kbdintctxt->device = devices[i];
++ kbdintctxt->devices_done |= 1 << i;
++ }
+ }
+ t = kbdintctxt->devices;
+ kbdintctxt->devices = t[len] ? xstrdup(t+len+1) : NULL;