aports/main/openssh/fix-utmp.patch
Daniel Néri 437d795d54 main/openssh: security upgrade to 9.9_p2
- CVE-2025-26465 - ssh(1) in OpenSSH versions 6.8p1 to
9.9p1 (inclusive) contained a logic error that allowed an on-path
attacker (a.k.a MITM) to impersonate any server when the
VerifyHostKeyDNS option is enabled. This option is off by default.

- CVE-2025-26466 - sshd(8) in OpenSSH versions 9.5p1 to
9.9p1 (inclusive) is vulnerable to a memory/CPU denial-of-service
related to the handling of SSH2_MSG_PING packets. This condition may
be mitigated using the existing PerSourcePenalties feature.

https://openwall.com/lists/oss-security/2025/02/18/1
2025-02-18 19:20:31 +00:00

25 lines
771 B
Diff

diff -rNU3 openssh-9.0p1.old/loginrec.c openssh-9.0p1/loginrec.c
--- openssh-9.0p1.old/loginrec.c 2022-04-06 02:47:48.000000000 +0200
+++ openssh-9.0p1/loginrec.c 2022-07-11 14:59:44.848827188 +0200
@@ -763,10 +763,6 @@
set_utmpx_time(li, utx);
utx->ut_pid = li->pid;
- /* strncpy(): Don't necessarily want null termination */
- strncpy(utx->ut_user, li->username,
- MIN_SIZEOF(utx->ut_user, li->username));
-
if (li->type == LTYPE_LOGOUT)
return;
@@ -775,6 +771,10 @@
* for logouts.
*/
+ /* strncpy(): Don't necessarily want null termination */
+ strncpy(utx->ut_user, li->username,
+ MIN_SIZEOF(utx->ut_user, li->username));
+
# ifdef HAVE_HOST_IN_UTMPX
strncpy(utx->ut_host, li->hostname,
MIN_SIZEOF(utx->ut_host, li->hostname));