From nobody Mon Feb 13 21:07:41 2023 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PFxkP6dYgz3q56r for ; Mon, 13 Feb 2023 21:07:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PFxkP5GcWz4R7Q for ; Mon, 13 Feb 2023 21:07:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1676322461; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=EPma0ce2VsUaIoYDLBrnxAlBBUIdVnLhGWH11jXKK60=; b=L9dhMMGwW+AfYB9UNlLmZNE7KR8znrXzUOYIwzeW8/VxfsUA5I9LfT3OPvqilN7YHQ0CSn iM2vIFfJ5hLFbEukQu4MqdYJ57XLmWevp6BVFx0vRpQNEHX166qmL0cnrbahBJ71abfNh1 XnQ2bue3PH3SvrjV+tFE8UbIZN/U14yiAbCol4uW9b5HDrR8n5bBSux4cb6HGN9q9b7Pnw pTxh022qIbSBQP6/nDO65abhoveypEizm7gx5QuhPftrFzicoOD3GCIh8r6k96C4eeo5ZY ORGWhrikby5PlCSZQ8CcSBQl8f3ji497K201EDgHIYkFLXvSIJQcN2d6rXfEtA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1676322461; a=rsa-sha256; cv=none; b=RbMgia95Wg8WrZ0XzRP/4BzIIKK1sxPztXEmZO6TrF+3jqlTH0NpuQT1UwAIlKghB3JHXt s0XxEWVDnF4Eo/uxCvwMwhXB7IEZv3PaOEIbAzCYbjNLXAmW8UNElpgX/bH/iegJVFkE0p WAsqyb/I+ED0wyr8gJFhl+YcDOg5EcSOgcIgbz6xzYIKR5/y7anjZ+Uf0hZPFfkuRC+x8o 7tAqu6cK3MENk0qjI96Nu8n2olvLjbuLTxNptOkVQ5VEzQfbaEWUEe16wG55Pz4Gmq1mHg 7TykKihlHgvwrcWEUVTpj1UITACSf5lrFzghNrDXukY2KW0O0pB9LxH+p3OQkg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4PFxkP4DnszXrV for ; Mon, 13 Feb 2023 21:07:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 31DL7fMB016409 for ; Mon, 13 Feb 2023 21:07:41 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 31DL7faD016408 for ports-bugs@FreeBSD.org; Mon, 13 Feb 2023 21:07:41 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 269538] security/openssh-portable Date: Mon, 13 Feb 2023 21:07:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: mike@sentex.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bdrewery@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports-bugs@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D269538 Bug ID: 269538 Summary: security/openssh-portable Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: bdrewery@FreeBSD.org Reporter: mike@sentex.net Flags: maintainer-feedback?(bdrewery@FreeBSD.org) Assignee: bdrewery@FreeBSD.org Opening a bug report for security/openssh-portable for the vuln database to= get flagged / updated for the 3 sec issues addressed https://www.openssh.com/releasenotes.html#9.2 * sshd(8): fix a pre-authentication double-free memory fault introduced in OpenSSH 9.1. This is not believed to be exploitable, and it occurs in the unprivileged pre-auth process that is subject to chroot(2) and is further sandboxed on most major platforms. * ssh(8): in OpenSSH releases after 8.7, the PermitRemoteOpen option would ignore its first argument unless it was one of the special keywords "any" or "none", causing the permission list to fail open if only one permission was specified. bz3515 * ssh(1): if the CanonicalizeHostname and CanonicalizePermittedCNAMEs options were enabled, and the system/libc resolver did not check that names in DNS responses were valid, then use of these options could allow an attacker with control of DNS to include invalid characters (possibly including wildcards) in names added to known_hosts files when they were updated. These names would still have to match the CanonicalizePermittedCNAMEs allow-list, so practical exploitation appears unlikely. --=20 You are receiving this mail because: You are the assignee for the bug.=