diff options
author | tez <tez@pkgsrc.org> | 2016-02-26 21:06:38 +0000 |
---|---|---|
committer | tez <tez@pkgsrc.org> | 2016-02-26 21:06:38 +0000 |
commit | d4d470fed1fd4ccc3f529769964704bf6e5981a5 (patch) | |
tree | c06c7d4c030798983290752b7a8d856b229cec3f /security | |
parent | ccb6670071ba3f511ae157555b3899b26c5f4096 (diff) | |
download | pkgsrc-d4d470fed1fd4ccc3f529769964704bf6e5981a5.tar.gz |
Fix for CVE-2016-1907
The ssh_packet_read_poll2 function in packet.c allows remote attackers to
cause a denial of service.
Diffstat (limited to 'security')
-rw-r--r-- | security/openssh/Makefile | 4 | ||||
-rw-r--r-- | security/openssh/distinfo | 4 | ||||
-rw-r--r-- | security/openssh/patches/patch-packet.c | 16 |
3 files changed, 21 insertions, 3 deletions
diff --git a/security/openssh/Makefile b/security/openssh/Makefile index 4c8678818dc..dab8517cd3c 100644 --- a/security/openssh/Makefile +++ b/security/openssh/Makefile @@ -1,8 +1,8 @@ -# $NetBSD: Makefile,v 1.240 2016/02/26 09:41:06 jperkin Exp $ +# $NetBSD: Makefile,v 1.241 2016/02/26 21:06:38 tez Exp $ DISTNAME= openssh-7.1p1 PKGNAME= ${DISTNAME:S/p1/.1/} -PKGREVISION= 2 +PKGREVISION= 3 CATEGORIES= security MASTER_SITES= ${MASTER_SITE_OPENBSD:=OpenSSH/portable/} diff --git a/security/openssh/distinfo b/security/openssh/distinfo index 53aa1824119..747daee1ff3 100644 --- a/security/openssh/distinfo +++ b/security/openssh/distinfo @@ -1,10 +1,11 @@ -$NetBSD: distinfo,v 1.98 2016/01/18 12:53:25 jperkin Exp $ +$NetBSD: distinfo,v 1.99 2016/02/26 21:06:38 tez Exp $ SHA1 (openssh-7.1p1-hpn-20150822.diff.bz2) = 444a2fbd80d57ff93b53ade84ec162e2a2f3aa67 RMD160 (openssh-7.1p1-hpn-20150822.diff.bz2) = 87fb6887d9ccb4b305ff3c25fd5f67847d9996d1 Size (openssh-7.1p1-hpn-20150822.diff.bz2) = 12173 bytes SHA1 (openssh-7.1p1.tar.gz) = ed22af19f962262c493fcc6ed8c8826b2761d9b6 RMD160 (openssh-7.1p1.tar.gz) = 2c97ea10099fa8658156c0351d60d715655b9b07 +SHA512 (openssh-7.1p1.tar.gz) = f1491ca5a0a733eb27ede966590642a412cb7be7178dcb7b9e5844bbdc8383032f4b00435192b95fc0365b6fe74d6c5ac8d6facbe9d51e1532d049e2f784e8f7 Size (openssh-7.1p1.tar.gz) = 1493170 bytes SHA1 (patch-Makefile.in) = 98960119bda68a663214c8880484552f1207bcfc SHA1 (patch-auth-passwd.c) = 92c487cc3c092efb56f8b4ac4ca08ccd67803a83 @@ -22,6 +23,7 @@ SHA1 (patch-loginrec.c) = 28082deb14258fe63cbecad8ac96afc016de439c SHA1 (patch-openbsd-compat_bsd-openpty.c) = eaac72830e36e307c19a7b679e6018ece9aebaac SHA1 (patch-openbsd-compat_openbsd-compat.h) = bedbede16ab2fe918419c994ba15a20167b411b4 SHA1 (patch-openbsd-compat_port-tun.c) = 690dfb1f945d186dd3de5bea70ed8fab86e590ee +SHA1 (patch-packet.c) = d302a0802861287e9a5230bbe2a1018c5dc17d28 SHA1 (patch-platform.c) = f8f211dbc5e596c0f82eb86324d18a84c6151ec5 SHA1 (patch-readconf.c) = e1663d4d9a7ca8de8f87ba42d7b764923cdcc5db SHA1 (patch-sandbox-darwin.c) = c9a1fe2e4dbf98e929d983b4206a244e0e354b75 diff --git a/security/openssh/patches/patch-packet.c b/security/openssh/patches/patch-packet.c new file mode 100644 index 00000000000..2c5f1a455da --- /dev/null +++ b/security/openssh/patches/patch-packet.c @@ -0,0 +1,16 @@ +$NetBSD: patch-packet.c,v 1.1 2016/02/26 21:06:38 tez Exp $ + +Fix for CVE-2016-1907 +from https://anongit.mindrot.org/openssh.git/commit/?id=2fecfd486bdba9f51b3a789277bb0733ca36e1c0 + + +--- packet.c.orig 2016-02-26 18:42:38.037291000 +0000 ++++ packet.c +@@ -1581,6 +1581,7 @@ ssh_packet_read_poll2(struct ssh *ssh, u + logit("Bad packet length %u.", state->packlen); + if ((r = sshpkt_disconnect(ssh, "Packet corrupt")) != 0) + return r; ++ return SSH_ERR_CONN_CORRUPT; + } + sshbuf_reset(state->incoming_packet); + } else if (state->packlen == 0) { |