commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
Fix ifdefs to not mask needed bits.
| 5fe81da22652f8caa63e9e3a1af519a85d36337e | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/5fe81da22652f8caa63e9e3a1af519a85d36337e | 2019-10-28 21:19:47+11:00 |
upstream: fix SEGV in UpdateHostkeys debug() message, triggered
when the update removed more host keys than remain present. Fix tested by
reporter James Cook, via bugs@
OpenBSD-Commit-ID: 44f641f6ee02bb957f0c1d150495b60cf7b869d3
| 2e1efcfd9f94352ca5f4b6958af8a454f8cf48cd | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/2e1efcfd9f94352ca5f4b6958af8a454f8cf48cd | 2021-05-26 01:47:24+00:00 |
upstream: fix incorrect plural; from Ville Skyt
=?UTF-8?q?t=C3=A4=20via=20GHPR#181?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
OpenBSD-Commit-ID: 92f31754c6296d8f403d7c293e09dc27292d22c9
| 460aee9298f365357e9fd26851c22e0dca51fd6a | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/460aee9298f365357e9fd26851c22e0dca51fd6a | 2021-04-03 05:46:41+00:00 |
fixup! if -s & -p specified, mention 'sftp -P' on
success
SSH-Copy-ID-Upstream: 32686e7c65b4fa2846e474d3315102dfa0f043b0
| 2709809fd616a0991dc18e3a58dea10fb383c3f0 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/2709809fd616a0991dc18e3a58dea10fb383c3f0 | 2023-05-24 19:41:14+02:00 |
Skip connection-timeout when missing FD passing.
This tests uses multiplexing which uses file descriptor passing, so
skip it if we don't have that. Fixes test failures on Cygwin.
| c3ffb54b4fc5e608206037921db6ccbc2f5ab25f | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/c3ffb54b4fc5e608206037921db6ccbc2f5ab25f | 2023-01-25 21:58:40+11:00 |
Fix memory leak in error path.
*info is allocated via xstrdup but was leaked in the PAM_AUTH_ERR path.
From github PR#266.
| 1ff38f34b4c4545eb28106629cafa1e0496bc726 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/1ff38f34b4c4545eb28106629cafa1e0496bc726 | 2021-08-11 18:07:58+05:00 |
upstream commit
Filter debug messages out of log before picking the last
two lines. Should prevent problems if any more debug output is added late in
the connection.
Upstream-Regress-ID: 345d0a9589c381e7d640a4ead06cfaadf4db1363
| 331b8e07ee5bcbdca12c11cc8f51a7e8de09b248 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/331b8e07ee5bcbdca12c11cc8f51a7e8de09b248 | 2016-03-04 02:48:06+00:00 |
Fix pasto in fallback code.
There is no parameter called "pathname", it should simply be "path".
bz#3059, patch from samuel at cendio.se.
| d0e51810f332fe44ebdba41113aacf319d35f5a5 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d0e51810f332fe44ebdba41113aacf319d35f5a5 | 2019-08-24 15:12:11+10:00 |
upstream commit
log debug messages sent to peer; ok deraadt markus
Upstream-ID: 3b4fdc0a06ea5083f61d96e20043000f477103d9
| eb80e26a15c10bc65fed8b8cdb476819a713c0fd | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/eb80e26a15c10bc65fed8b8cdb476819a713c0fd | 2017-10-13 21:13:54+00:00 |
upstream commit
Reduce timing attack against obsolete CBC modes by always
computing the MAC over a fixed size of data. Reported by Jean Paul
Degabriele, Kenny Paterson, Torben Hansen and Martin Albrecht. ok djm@
Upstream-ID: f20a13279b00ba0afbacbcc1f04e62e9d41c2912
| b98a2a8348e907b3d71caafd80f0be8fdd075943 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/b98a2a8348e907b3d71caafd80f0be8fdd075943 | 2016-07-18 11:35:33+00:00 |
disable SANDBOX_SECCOMP_FILTER_DEBUG
It was mistakenly enabled in 2580916e4872
Reported by Peter sec-openssh-com.22.fichtner AT 0sg.net
| bc234605fa3eb10f56bf0d74c8ecb0d91ada9d05 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/bc234605fa3eb10f56bf0d74c8ecb0d91ada9d05 | 2022-12-07 18:38:25+11:00 |
upstream commit
fix matching for pattern lists that contain a single
negated match, e.g. "Host !example"
report and patch from Robin Becker. bz#1918 ok dtucker@
Upstream-ID: 05a0cb323ea4bc20e98db099b42c067bfb9ea1ea
| 4067ec8a4c64ccf16250c35ff577b4422767da64 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/4067ec8a4c64ccf16250c35ff577b4422767da64 | 2016-08-23 03:22:49+00:00 |
fix netcat build problem
| afbd9ec9e2dbad04834ce7ce53e58740434f32a5 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/afbd9ec9e2dbad04834ce7ce53e58740434f32a5 | 2020-10-17 11:33:13+11:00 |
fix newline escaping for unsupported_algorithms
The hmac-ripemd160 was incorrect and could lead to broken
Makefiles on systems that lacked support for it, but I made
all the others consistent too.
| 679ce88ec2a8e2fe6515261c489e8c1449bb9da9 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/679ce88ec2a8e2fe6515261c489e8c1449bb9da9 | 2016-07-15 13:44:38+10:00 |
upstream: fix memleak on session-bind path; from Pedro Martelletto, ok
dtucker@
OpenBSD-Commit-ID: e85899a26ba402b4c0717b531317e8fc258f0a7e
| 247082b5013f0d4fcae8f97453f2a2f01bcda811 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/247082b5013f0d4fcae8f97453f2a2f01bcda811 | 2022-04-29 03:13:32+00:00 |
Add includes to ptimeout test.
Fixes test failures on AIX due to type mismatches.
| ef798bad38505f7bf1b5fa5c0843dfc5a2b192b9 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/ef798bad38505f7bf1b5fa5c0843dfc5a2b192b9 | 2023-02-20 17:37:15+05:30 |
upstream commit
Add missing braces; fixes 'write: Socket is not
connected' error in ssh. ok deraadt@
OpenBSD-Commit-ID: db73a3a9e147722d410866cac34d43ed52e1ad24
| a60c5dcfa2538ffc94dc5b5adb3db5b6ed905bdb | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/a60c5dcfa2538ffc94dc5b5adb3db5b6ed905bdb | 2018-01-23 18:33:49+00:00 |
fix URL for connect.c
| a4f5b507c708cc3dc2c8dd2d02e4416d7514dc23 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/a4f5b507c708cc3dc2c8dd2d02e4416d7514dc23 | 2015-08-21 14:43:55+10:00 |
upstream commit
fix (another) problem in PermitOpen introduced during the
channels.c refactor: the third and subsequent arguments to PermitOpen were
being silently ignored; ok markus@
Upstream-ID: 067c89f1f53cbc381628012ba776d6861e6782fd
| 69bda0228861f3dacd4fb3d28b60ce9d103d254b | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/69bda0228861f3dacd4fb3d28b60ce9d103d254b | 2017-10-04 18:49:30+00:00 |
Fix custom OpenSSL tests.
Check out specified OpenSSL version. Install custom libcrypto where
configure expects to find it. Remove unneeded OpenSSL config time
options. Older OpenSSL versions were not make -j safe so remove it.
| b3cc9fbdff2782eca79e33e02ac22450dc63bce9 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/b3cc9fbdff2782eca79e33e02ac22450dc63bce9 | 2021-04-27 09:18:02+10:00 |
upstream: spelling;
OpenBSD-Commit-ID: db542918185243bea17202383a581851736553cc
| f535ff922a67d9fcc5ee69d060d1b21c8bb01d14 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/f535ff922a67d9fcc5ee69d060d1b21c8bb01d14 | 2018-06-19 05:36:57+00:00 |
upstream: Fix two race conditions in sshd relating to SIGHUP:
1. Recently-forked child processes will briefly remain listening to
listen_socks. If the main server sshd process completes its restart
via execv() before these sockets are closed by the child processes
then it can fail to listen at the desired addresses/ports and/or
fail to restart.
2. When a SIGHUP is received, there may be forked child processes that
are awaiting their reexecution state. If the main server sshd
process restarts before passing this state, these child processes
will yield errors and use a fallback path of reading the current
sshd_config from the filesystem rather than use the one that sshd
was started with.
To fix both of these cases, we reuse the startup_pipes that are shared
between the main server sshd and forked children. Previously this was
used solely to implement tracking of pre-auth child processes for
MaxStartups, but this extends the messaging over these pipes to include
a child->parent message that the parent process is safe to restart. This
message is sent from the child after it has completed its preliminaries:
closing listen_socks and receiving its reexec state.
bz#2953, reported by Michal Koutný; ok markus@ dtucker@
OpenBSD-Commit-ID: 7df09eacfa3ce13e9a7b1e9f17276ecc924d65ab
| 76a24b3fa193a9ca3e47a8779d497cb06500798b | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/76a24b3fa193a9ca3e47a8779d497cb06500798b | 2019-03-01 02:32:39+00:00 |
upstream: fix integer overflow in XMSS private key parsing.
Reported by Adam Zabrocki via SecuriTeam's SSH program.
Note that this code is experimental and not compiled by default.
ok markus@
OpenBSD-Commit-ID: cd0361896d15e8a1bac495ac583ff065ffca2be1
| a546b17bbaeb12beac4c9aeed56f74a42b18a93a | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/a546b17bbaeb12beac4c9aeed56f74a42b18a93a | 2019-10-09 00:02:57+00:00 |
upstream: fix breakage of -W forwaring introduced in 1.554; reported by
naddy@ and sthen@, ok sthen@
OpenBSD-Commit-ID: f72558e643a26dc4150cff6e5097b5502f6c85fd
| c4902e1a653c67fea850ec99c7537f358904c0af | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/c4902e1a653c67fea850ec99c7537f358904c0af | 2021-05-17 11:43:16+00:00 |
upstream: fix compilation with DEBUG_KEXDH; bz#3160 ok dtucker@
OpenBSD-Commit-ID: 832e771948fb45f2270e8b8895aac36d176ba17a
| ecb2c02d994b3e21994f31a70ff911667c262f1f | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/ecb2c02d994b3e21994f31a70ff911667c262f1f | 2020-05-08 05:13:14+00:00 |
upstream: fix miscellaneous text problems; ok djm@
OpenBSD-Commit-ID: 0cbf411a14d8fa0b269b69cbb1b4fc0ca699fe9f
| ad38406fc95fa223b0ef2edf8ff50508f8ab1cb6 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/ad38406fc95fa223b0ef2edf8ff50508f8ab1cb6 | 2019-11-01 12:10:43+00:00 |
fix broken case statement in previous
| 5fd922ade1b25880fe8a8249f5c0385e413108f9 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/5fd922ade1b25880fe8a8249f5c0385e413108f9 | 2022-06-24 14:43:54+10:00 |
upstream: fix some memleaks in test_helper code
bz#3037 from Jitendra Sharma
OpenBSD-Regress-ID: 71440fa9186f5842a65ce9a27159385c6cb6f751
| c4ffb72593c08921cf9291bc05a5ef1d0aaa6891 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/c4ffb72593c08921cf9291bc05a5ef1d0aaa6891 | 2019-08-02 01:41:24+00:00 |
upstream commit
Fix typo in previous
| 43beea053db191cac47c2cd8d3dc1930158aff1a | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/43beea053db191cac47c2cd8d3dc1930158aff1a | 2015-04-28 10:25:15+00:00 |
Resync fmt_scaled. with OpenBSD.
Fixes underflow reported in bz#3401.
| 2893c5e764557f48f9d6a929e224ed49c59545db | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/2893c5e764557f48f9d6a929e224ed49c59545db | 2022-03-11 18:43:58+11:00 |
Fix misspellings of regress CONFOPTS env variables.
Patch from Bryan Drewery.
| d9b9b43656091cf0ad55c122f08fadb07dad0abd | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d9b9b43656091cf0ad55c122f08fadb07dad0abd | 2015-04-07 09:10:00+10:00 |
harden Linux seccomp sandbox
Linux mmap(2) and madvise(2) syscalls support quite a number of funky
flags that we don't expect that sshd/libc will ever need. We can
exclude this kernel attack surface by filtering the mmap(2) flags
and the madvise(2) advice arguments.
Similarly, the sandboxed process in sshd is a single-threaded program
that does not use shared memory for synchronisation or communication.
Therefore, there should be no reason for the advanced priority
inheritance futex(2) operations to be necessary. These can also be
excluded.
Motivated by Jann Horn pointing out that there have been kernel bugs
in nearby Linux kernel code, e.g. CVE-2020-29368, CVE-2020-29374 and
CVE-2022-42703.
Feedback Jann Horn, ok dtucker@
| 195313dfe10a23c82e9d56d5fdd2f59beee1bdcf | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/195313dfe10a23c82e9d56d5fdd2f59beee1bdcf | 2023-02-03 16:33:09+11:00 |
Fix signedness bug in Cygwin code
The Cygwin-specific pattern match code has a bug. It checks
the size_t value returned by mbstowcs for being < 0. The right
thing to do is to check against (size_t) -1. Fix that.
Signed-off-by: Corinna Vinschen <[email protected]>
| 68085066b6bad43643b43f5957fcc5fd34782ccd | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/68085066b6bad43643b43f5957fcc5fd34782ccd | 2022-01-21 03:22:56+11:00 |
upstream: fix a bug I introduced in r1.406: when printing private key
fingerprint of old-format key, key comments were not being displayed. Spotted
by loic AT venez.fr, ok dtucker
OpenBSD-Commit-ID: 2d98e4f9eb168eea733d17e141e1ead9fe26e533
| a98d5ba31e5e7e01317352f85fa63b846a960f8c | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/a98d5ba31e5e7e01317352f85fa63b846a960f8c | 2020-04-20 04:43:57+00:00 |
fix typo that prevented detection of Linux VRF
Reported by hexiaowen AT huawei.com
| 8729498a5d239980a91d32f031b34e8c58c52f62 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/8729498a5d239980a91d32f031b34e8c58c52f62 | 2019-07-10 09:43:19+10:00 |
fix key-options.sh on platforms without openpty(3)
Skip the pty tests if the platform lacks openpty(3) and has to chown(2)
the pty device explicitly. This typically requires root permissions that
this test lacks.
bz#2856 ok dtucker@
| 54268d589e85ecc43d3eba8d83f327bdada9d696 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/54268d589e85ecc43d3eba8d83f327bdada9d696 | 2018-05-11 14:04:40+10:00 |
Fix typos in INSTALL: s/avilable/available/ s/suppports/supports/
| 11d427162778c18fa42917893a75d178679a2389 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/11d427162778c18fa42917893a75d178679a2389 | 2020-02-14 16:14:23+09:00 |
upstream: fix ssh-keysign fd handling problem introduced in r1.304
caused by a typo (STDIN_FILENO vs STDERR_FILENO)
OpenBSD-Commit-ID: 57a0b4be7bef23963afe24150e24bf014fdd9cb0
| c586d2d3129265ea64b12960c379d634bccb6535 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/c586d2d3129265ea64b12960c379d634bccb6535 | 2019-05-31 03:20:07+00:00 |
fix FIDO key support for !OPENSSL_HAS_ECC case
ok dtucker
| 872595572b6c9a584ed754165e8b7c4c9e7e1d61 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/872595572b6c9a584ed754165e8b7c4c9e7e1d61 | 2021-10-01 16:35:05+10:00 |
upstream: Fix up whitespace left by previous
change removing privsep. No other changes.
OpenBSD-Regress-ID: 87adec225d8afaee4d6a91b2b71203f52bf14b15
| 76a398edfb51951b2d65d522d7b02c72304db300 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/76a398edfb51951b2d65d522d7b02c72304db300 | 2021-09-30 05:26:26+00:00 |
Fix mem leak in unit test.
Patch from jitendra.sharma at intel.com.
| d46075b923bf25e6f25959a3f5b458852161cb3e | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d46075b923bf25e6f25959a3f5b458852161cb3e | 2019-08-05 21:36:48+10:00 |
Fix merge conflict.
| f58acaf8c7315483f4ac87d46a1aa2142a713cd8 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/f58acaf8c7315483f4ac87d46a1aa2142a713cd8 | 2022-11-07 15:10:59+11:00 |
upstream commit
Fix public key authentication when multiple
authentication is in use. Instead of deleting and re-preparing the entire
keys list, just reset the 'used' flags; the keys list is already in a good
order (with already- tried keys at the back)
Analysis and patch from Vincent Brillault on bz#2642; ok dtucker@
Upstream-ID: 7123f12dc2f3bcaae715853035a97923d7300176
| b9844a45c7f0162fd1b5465683879793d4cc4aaa | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/b9844a45c7f0162fd1b5465683879793d4cc4aaa | 2016-12-04 23:54:02+00:00 |
Fix error message w/out nistp521.
Correct error message when OpenSSL doesn't support certain ECDSA key
lengths.
| 9b47b083ca9d866249ada9f02dbd57c87b13806e | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/9b47b083ca9d866249ada9f02dbd57c87b13806e | 2018-11-08 22:41:59-08:00 |
upstream: Fix a couple of whitespace things. Portable already has
these so this removes two diffs between the two.
OpenBSD-Commit-ID: 769f017ebafd8e741e337b3e9e89eb5ac73c9c56
| b5d23150b4e3368f4983fd169d432c07afeee45a | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/b5d23150b4e3368f4983fd169d432c07afeee45a | 2021-07-05 01:21:07+00:00 |
Fix syntax error on Linux/X32
Patch from Mike Frysinger
| 6b853c6f8ba5eecc50f3b57af8e63f8184eb0fa6 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/6b853c6f8ba5eecc50f3b57af8e63f8184eb0fa6 | 2017-03-21 08:47:55+11:00 |
upstream commit
Fix printing (ssh -G ...) of HostKeyAlgorithms=+...
Reported by Bryan Drewery
Upstream-ID: 19ad20c41bd5971e006289b6f9af829dd46c1293
| 60a92470e21340e1a3fc10f9c7140d8e1519dc55 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/60a92470e21340e1a3fc10f9c7140d8e1519dc55 | 2015-08-21 23:53:08+00:00 |
fix kex test
| 1ca3e2155aa5d3801a7ae050f85c71f41fcb95b1 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/1ca3e2155aa5d3801a7ae050f85c71f41fcb95b1 | 2015-01-20 10:11:31+11:00 |
Fix sshbuf_new error path in skey.
| 416287d45fcde0a8e66eee8b99aa73bd58607588 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/416287d45fcde0a8e66eee8b99aa73bd58607588 | 2018-07-11 10:10:26+10:00 |
upstream commit
fix three bugs in KRL code related to (unused) signature
support: verification length was being incorrectly calculated, multiple
signatures were being incorrectly processed and a NULL dereference that
occurred when signatures were verified. Reported by Carl Jackson
Upstream-ID: e705e97ad3ccce84291eaa651708dd1b9692576b
| 422d1b3ee977ff4c724b597fb2e437d38fc8de9d | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/422d1b3ee977ff4c724b597fb2e437d38fc8de9d | 2015-12-31 00:33:52+00:00 |
upstream: ssh-keygen: fix touch prompt, pin retries;
part of GHPR329 from Pedro Martelletto
OpenBSD-Commit-ID: 75d1005bd2ef8f29fa834c90d2684e73556fffe8
| f208e3b9ffb5ee76cf9c95df7ff967adc7f51c7d | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/f208e3b9ffb5ee76cf9c95df7ff967adc7f51c7d | 2022-07-20 03:33:22+00:00 |
upstream: Fix typo. From AlexanderStohr via github PR#343.
OpenBSD-Commit-ID: a134c9b4039e48803fc6a87f955b0f4a03181497
| 4cf8d0c0f3030f594a238bab21a0695735515487 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/4cf8d0c0f3030f594a238bab21a0695735515487 | 2022-09-21 22:26:50+00:00 |
Determine appropriate salt for invalid users.
When sshd is processing a non-PAM login for a non-existent user it uses
the string from the fakepw structure as the salt for crypt(3)ing the
password supplied by the client. That string has a Blowfish prefix, so on
systems that don't understand that crypt will fail fast due to an invalid
salt, and even on those that do it may have significantly different timing
from the hash methods used for real accounts (eg sha512). This allows
user enumeration by, eg, sending large password strings. This was noted
by EddieEzra.Harari at verint.com (CVE-2016-6210).
To mitigate, use the same hash algorithm that root uses for hashing
passwords for users that do not exist on the system. ok djm@
| 9286875a73b2de7736b5e50692739d314cd8d9dc | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/9286875a73b2de7736b5e50692739d314cd8d9dc | 2016-07-15 13:32:45+10:00 |
upstream: fix edit mistake; spotted by jmc@
OpenBSD-Commit-ID: dd724e1c52c9d6084f4cd260ec7e1b2b138261c6
| f0fcd7e65087db8c2496f13ed39d772f8e38b088 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/f0fcd7e65087db8c2496f13ed39d772f8e38b088 | 2018-09-12 06:18:59+00:00 |
Add missing bracket in EGD seeding code.
When configured --with-prngd-socket the code had a missing bracket after
an API change. Fix that and a couple of warnings. bz#3032 , from
ole.weidner at protonmail.ch
| 01a1e21cd55d99293c8ff8ed7c590f2ee440da43 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/01a1e21cd55d99293c8ff8ed7c590f2ee440da43 | 2019-07-06 12:00:41+10:00 |
Fix tunnel forwarding broken in 7.7p1
bz2855, ok dtucker@
| cfb1d9bc76734681e3dea532a1504fcd466fbe91 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/cfb1d9bc76734681e3dea532a1504fcd466fbe91 | 2018-04-13 13:38:06+10:00 |
upstream: fix memory leak in error path; bz#3074 patch from
[email protected], ok dtucker
OpenBSD-Commit-ID: d031853f3ecf47b35a0669588f4d9d8e3b307b3c
| 07f2c7f34951c04d2cd796ac6c80e47c56c4969e | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/07f2c7f34951c04d2cd796ac6c80e47c56c4969e | 2019-10-04 04:31:59+00:00 |
configure.ac: fix ldns test
When running ./configure --with-ldns, if ldns-config cannot be found, we
add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.
| 0c428c0e991e2c4fabc48cf5d9b8f84c9412e0c3 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/0c428c0e991e2c4fabc48cf5d9b8f84c9412e0c3 | 2020-01-20 13:58:11+01:00 |
upstream commit
Fix \-escaping bug that caused forward path parsing to skip
two characters and skip past the end of the string.
Based on patch by Salvador Fandino; ok dtucker@
Upstream-ID: 7b879dc446335677cbe4cb549495636a0535f3bd
| 78c2a4f883ea9aba866358e2acd9793a7f42ca93 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/78c2a4f883ea9aba866358e2acd9793a7f42ca93 | 2015-06-26 05:13:20+00:00 |
upstream commit
Validate address ranges for AllowUser/DenyUsers at
configuration load time and refuse to accept bad ones. It was previously
possible to specify invalid CIDR address ranges (e.g. [email protected]/55) and
these would always match.
Thanks to Laurence Parry for a detailed bug report. ok markus (for
a previous diff version)
Upstream-ID: 9dfcdd9672b06e65233ea4434c38226680d40bfb
| 010359b32659f455fddd2bd85fd7cc4d7a3b994a | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/010359b32659f455fddd2bd85fd7cc4d7a3b994a | 2016-11-06 05:46:37+00:00 |
upstream: fix memleaks in private key deserialisation; enforce more
consistency between redundant fields in private key certificate and private
key body; ok markus@
OpenBSD-Commit-ID: dec344e414d47f0a7adc13aecf3760fe58101240
| f71219a01d8f71c4b3ed7e456337a84ddba1653e | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/f71219a01d8f71c4b3ed7e456337a84ddba1653e | 2021-02-02 22:36:46+00:00 |
upstream: more strictly enforce KEX state-machine by banning packet
types once they are received. Fixes memleak caused by duplicate
SSH2_MSG_KEX_DH_GEX_REQUEST (spotted by portable OpenSSH kex_fuzz via
oss-fuzz #30078).
ok markus@
OpenBSD-Commit-ID: 87331c715c095b587d5c88724694cdeb701c9def
| 3dd0c64e08f1bba21d71996d635c7256c8c139d1 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/3dd0c64e08f1bba21d71996d635c7256c8c139d1 | 2021-01-31 22:55:29+00:00 |
upstream commit
Back out 'plug memleak'.
Upstream-ID: 4faacdde136c24a961e24538de373660f869dbc0
| 7ec4946fb686813eb5f8c57397e465f5485159f4 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/7ec4946fb686813eb5f8c57397e465f5485159f4 | 2016-05-24 02:31:57+00:00 |
upstream: silence (to log level debug2) failure messages when
loading the default hostkeys. Hostkeys explicitly specified in the
configuration or on the command-line are still reported as errors, and
failure to load at least one host key remains a fatal error.
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Based on patch from Dag-Erling Smørgrav via
https://github.com/openssh/openssh-portable/pull/103
ok markus@
OpenBSD-Commit-ID: ffc2e35a75d1008effaf05a5e27425041c27b684
| 928f1231f65f88cd4c73e6e0edd63d2cf6295d77 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/928f1231f65f88cd4c73e6e0edd63d2cf6295d77 | 2018-11-19 04:12:32+00:00 |
upstream commit
Fix bug introduced in rev 1.467 which causes
"buffer_get_bignum_ret: incomplete message" errors when built with WITH_SSH1
and run such that no Protocol 1 ephemeral host key is generated (eg "Protocol
2", no SSH1 host key supplied). Reported by rainer.laatsch at t-online.de,
ok deraadt@
Upstream-ID: aa6b132da5c325523aed7989cc5a320497c919dc
| e600348a7afd6325cc5cd783cb424065cbc20434 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/e600348a7afd6325cc5cd783cb424065cbc20434 | 2016-08-03 04:23:55+00:00 |
Check for and work around buggy fflush(NULL).
Some really old platforms (eg SunOS4) segfault on fflush(NULL) so check
for and work around. With klausz at haus-gisela.de.
| 58fd4c5c0140f6636227ca7acbb149ab0c2509b9 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/58fd4c5c0140f6636227ca7acbb149ab0c2509b9 | 2018-03-05 19:28:08+11:00 |
upstream: memleak on error path; ok markus@
OpenBSD-Commit-ID: 2091a36d6ca3980c81891a6c4bdc544e63cb13a8
| 3287790e78bf5b53c4a3cafb67bb5aa03e3910f0 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/3287790e78bf5b53c4a3cafb67bb5aa03e3910f0 | 2021-02-02 22:35:14+00:00 |
upstream: less confusing debug message; bz#3365
OpenBSD-Commit-ID: 836268d3642c2cdc84d39b98d65837f5241e4a50
| 199c4df66c0e39dd5c3333b162af274678c0501d | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/199c4df66c0e39dd5c3333b162af274678c0501d | 2021-11-18 21:32:11+00:00 |
upstream: Save debug logs from ssh for debugging purposes.
OpenBSD-Regress-ID: 109e40b06de1c006a3b8e0d8745b790b2c5870a0
| 344a0e8240eaf08da5d46a5e3a9ecad6e4f64c35 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/344a0e8240eaf08da5d46a5e3a9ecad6e4f64c35 | 2023-01-06 08:50:33+00:00 |
upstream: Remove now-unused compat bit SSH_BUG_RSASIGMD5. The code
to set this was removed in OpenSSH 7.7 when support for SSH implementations
dating back to before RFC standardization were removed. "burn it all" djm@
OpenBSD-Commit-ID: 6330935fbe23dd00be79891505e06d1ffdac7cda
| 2a7e3449908571af601a4c2d12ab140096442e47 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/2a7e3449908571af601a4c2d12ab140096442e47 | 2023-02-17 04:22:50+00:00 |
upstream commit
add a debug2() right before DNS resolution; it's a place
where ssh could previously silently hang for a while. bz#2433
Upstream-ID: 52a1a3e0748db66518e7598352c427145692a6a0
| a85768a9321d74b41219eeb3c9be9f1702cbf6a5 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/a85768a9321d74b41219eeb3c9be9f1702cbf6a5 | 2015-09-04 04:56:09+00:00 |
upstream: memleaks; found by valgrind
OpenBSD-Commit-ID: 6c3ba22be53e753c899545f771e8399fc93cd844
| de2997a4cf22ca0a524f0e5b451693c583e2fd89 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/de2997a4cf22ca0a524f0e5b451693c583e2fd89 | 2018-07-16 03:09:13+00:00 |
Prevent excessively long username going to PAM.
This is a mitigation for a buffer overflow in Solaris' PAM username
handling (CVE-2020-14871), and is only enabled for Sun-derived PAM
implementations. This is not a problem in sshd itself, it only
prevents sshd from being used as a vector to attack Solaris' PAM.
It does not prevent the bug in PAM from being exploited via some other
PAM application.
Based on github PR#212 from Mike Scott but implemented slightly
differently. ok tim@ djm@
| fcf429a4c69d30d8725612a55b37181594da8ddf | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/fcf429a4c69d30d8725612a55b37181594da8ddf | 2020-11-11 12:30:46+11:00 |
upstream: remove debugging goop that snuck in to last commit
OpenBSD-Commit-ID: 8ea4455a2d9364a0a04f9e4a2cbfa4c9fcefe77e
| 575d0042a94997c1eeb86a6dcfb30b3c7bdbcba3 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/575d0042a94997c1eeb86a6dcfb30b3c7bdbcba3 | 2019-11-14 21:56:52+00:00 |
upstream: tweak debug message
OpenBSD-Commit-ID: 2bf336d3be0b7e3dd97920d7e7471146a281d2b9
| 9a1225e8ca2ce1fe809910874935302234399a6d | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/9a1225e8ca2ce1fe809910874935302234399a6d | 2019-11-16 23:17:20+00:00 |
Refuse to use OpenSSL 3.0.4 due to potential RCE.
OpenSSL has a potential RCE in its RSA implementation (CVE-2022-2274)
so refuse to use that specific version.
| d9eaea4bea6271bcee6a2b9428f1271faf2d033b | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d9eaea4bea6271bcee6a2b9428f1271faf2d033b | 2022-07-12 12:54:49+10:00 |
upstream: ssh: The client configuration keyword is
"hostbasedacceptedalgorithms"
This fixes a mistake that slipped in when "HostbasedKeyTypes" was
renamed to "HostbasedAcceptedAlgorithms".
Bug report by [email protected]
OpenBSD-Commit-ID: d745a7e8e50b2589fc56877f322ea204bc784f38
| 9acd76e6e4d2b519773e7119c33cf77f09534909 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/9acd76e6e4d2b519773e7119c33cf77f09534909 | 2021-05-23 18:22:57+00:00 |
upstream: properly fix ProxyJump parsing; Thanks to tb@ for
pointing out my error (parse_ssh_uri() can return -1/0/1, that I missed).
Reported by Raf Czlonka via bugs@
ok tb@
OpenBSD-Commit-ID: a2991a3794bcaf1ca2b025212cce11cdb5f6b7d6
| a11ca015879eab941add8c6bdaaec7d41107c6f5 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/a11ca015879eab941add8c6bdaaec7d41107c6f5 | 2020-12-21 09:19:53+00:00 |
upstream: memleak on error path; found by libfuzzer
OpenBSD-Commit-ID: 34d44cb0fb5bdb5fcbc6b02b804e71b20a7a5fc7
| 69159afe24120c97e5ebaf81016c85968afb903e | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/69159afe24120c97e5ebaf81016c85968afb903e | 2019-09-05 05:42:59+00:00 |
upstream: fix some corner-case bugs in scp sftp-mode handling of
~-prefixed paths; spotted by jsg; feedback jsg & deraadt, ok jsg & markus
OpenBSD-Commit-ID: d1697dbaaa9f0f5649d69be897eab25c7d37c222
| 63670d4e9030bcee490d5a9cce561373ac5b3b23 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/63670d4e9030bcee490d5a9cce561373ac5b3b23 | 2022-01-08 07:36:11+00:00 |
upstream commit
fix bug in previous; was printing incorrect string for
failed host key algorithms negotiation
Upstream-ID: 22c0dc6bc61930513065d92e11f0753adc4c6e6e
| 5cefe769105a2a2e3ca7479d28d9a325d5ef0163 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/5cefe769105a2a2e3ca7479d28d9a325d5ef0163 | 2015-07-29 08:34:54+00:00 |
upstream: Remove leftover debugging.
OpenBSD-Regress-ID: 3d86c3d4867e46b35af3fd2ac8c96df0ffdcfeb9
| 8fe25440206319d15b52d12b948a5dfdec14dca3 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/8fe25440206319d15b52d12b948a5dfdec14dca3 | 2019-01-28 03:28:10+00:00 |
upstream commit
Fix two rare edge cases: 1. If vasprintf() returns < 0,
do not access a NULL pointer in snmprintf(), and do not free() the pointer
returned from vasprintf() because on some systems other than OpenBSD, it
might be a bogus pointer. 2. If vasprintf() returns == 0, return 0 and ""
rather than -1 and NULL.
Besides, free(dst) is pointless after failure (not a bug).
One half OK martijn@, the other half OK deraadt@;
committing quickly before people get hurt.
Upstream-Regress-ID: b164f20923812c9bac69856dbc1385eb1522cba4
| 75f0844b4f29d62ec3a5e166d2ee94b02df819fc | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/75f0844b4f29d62ec3a5e166d2ee94b02df819fc | 2016-05-30 12:05:56+00:00 |
upstream: spelling
OpenBSD-Commit-ID: c63e43087a64d0727af13409c708938e05147b62
| c45a752f0de611afd87755c2887c8a24816d08ee | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/c45a752f0de611afd87755c2887c8a24816d08ee | 2022-01-01 05:55:06+00:00 |
Output test debug logs on failure.
| a09e98dcae1e26f026029b7142b0e0d10130056f | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/a09e98dcae1e26f026029b7142b0e0d10130056f | 2020-08-07 15:37:37+10:00 |
upstream: put back the mux_ctx memleak fix for SSH_CHANNEL_MUX_CLIENT
OK mfriedl@
OpenBSD-Commit-ID: 1aba1da828956cacaadb81a637338734697d9798
| d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd | 2021-09-14 11:04:21+00:00 |
fix some bugs in the fuzzer
| dc7bc52372f2744fa39191577be5306ee57aacd4 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/dc7bc52372f2744fa39191577be5306ee57aacd4 | 2022-05-30 09:29:09+10:00 |
upstream: support for using the SFTP protocol for file transfers in
scp, via a new "-M sftp" option. Marked as experimental for now.
Some corner-cases exist, in particular there is no attempt to
provide bug-compatibility with scp's weird "double shell" quoting
rules.
Mostly by Jakub Jelen in GHPR#194 with some tweaks by me. ok markus@
Thanks jmc@ for improving the scp.1 bits.
OpenBSD-Commit-ID: 6ce4c9157ff17b650ace571c9f7793d92874051c
| 197e29f1cca190d767c4b2b63a662f9a9e5da0b3 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/197e29f1cca190d767c4b2b63a662f9a9e5da0b3 | 2021-08-02 23:38:27+00:00 |
another spelling error in comment
| 397f217e8640e75bb719a8e87111b4bd848fb3df | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/397f217e8640e75bb719a8e87111b4bd848fb3df | 2020-03-13 14:24:23+11:00 |
ignore PAM environment vars when UseLogin=yes
If PAM is configured to read user-specified environment variables
and UseLogin=yes in sshd_config, then a hostile local user may
attack /bin/login via LD_PRELOAD or similar environment variables
set via PAM.
CVE-2015-8325, found by Shayan Sadigh, via Colin Watson
| 85bdcd7c92fe7ff133bbc4e10a65c91810f88755 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/85bdcd7c92fe7ff133bbc4e10a65c91810f88755 | 2016-04-13 10:39:57+10:00 |
upstream: spelling fix;
OpenBSD-Commit-ID: 3c079523c4b161725a4b15dd06348186da912402
| ba261a1dd33266168ead4f8f40446dcece4d1600 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/ba261a1dd33266168ead4f8f40446dcece4d1600 | 2020-01-31 22:25:59+00:00 |
upstream: fix debug statement
OpenBSD-Commit-ID: 42c6edeeda5ce88b51a20d88c93be3729ce6b916
| ebd29e90129cf18fedfcfe1de86e324228669295 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/ebd29e90129cf18fedfcfe1de86e324228669295 | 2020-04-03 04:06:26+00:00 |
upstream commit
Fix typo in ~C error message for bad port forward
cancellation. bz#2672, from Brad Marshall via Colin Watson and Ubuntu's
bugtracker.
Upstream-ID: 0d4a7e5ead6cc59c9a44b4c1e5435ab3aada09af
| 9390b0031ebd6eb5488d3bc4d4333c528dffc0a6 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/9390b0031ebd6eb5488d3bc4d4333c528dffc0a6 | 2017-01-29 21:35:23+00:00 |
upstream commit
fix memory leak in error path ok djm@
Upstream-ID: dd2f402b0a0029b755df029fc7f0679e1365ce35
| 66d2e229baa9fe57b868c373b05f7ff3bb20055b | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/66d2e229baa9fe57b868c373b05f7ff3bb20055b | 2015-10-21 11:33:03+00:00 |
upstream: fix bug that prevented certification of ed25519-sk keys
OpenBSD-Commit-ID: 64c8cc6f5de2cdd0ee3a81c3a9dee8d862645996
| 740c4bc9875cbb4b9fc03fd5eac19df080f20df5 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/740c4bc9875cbb4b9fc03fd5eac19df080f20df5 | 2019-11-18 06:39:02+00:00 |
upstream: fix memory leak; Coverity CID 291848
with/ok dtucker@
OpenBSD-Commit-ID: 37f80cb5d075ead5a00ad1b74175684ab1156ff8
| 13ae327eae598b1043e5ec30e4b170edb3c898a5 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/13ae327eae598b1043e5ec30e4b170edb3c898a5 | 2023-03-29 00:18:35+00:00 |
upstream commit
"commandline" -> "command line", since there are so few
examples of the former in the pages, so many of the latter, and in some of
these pages we had multiple spellings;
prompted by tj
Upstream-ID: 78459d59bff74223f8139d9001ccd56fc4310659
| 8b29008bbe97f33381d9b4b93fcfa304168d0286 | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/8b29008bbe97f33381d9b4b93fcfa304168d0286 | 2015-11-05 09:48:05+00:00 |
upstream: fix typos in sk_enroll
OpenBSD-Commit-ID: faa9bf779e008b3e64e2eb1344d9b7d83b3c4487
| d431778a561d90131814f986b646299f9af33c8c | openssh-portable | neuralsentry | 0 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d431778a561d90131814f986b646299f9af33c8c | 2019-11-15 15:41:01+00:00 |
upstream: fix bug in client that was keeping a redundant ssh-agent
socket around for the life of the connection; bz#2912; reported by Simon
Tatham; ok dtucker@
OpenBSD-Commit-ID: 4ded588301183d343dce3e8c5fc1398e35058478
| aaed635e3a401cfcc4cc97f33788179c458901c3 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/aaed635e3a401cfcc4cc97f33788179c458901c3 | 2018-11-16 02:46:20+00:00 |
upstream commit
small memleak: free fd_set on connection timeout (though
we are heading to exit anyway). From Tom Rix in bz#2683
Upstream-ID: 10e3dadbb8199845b66581473711642d9e6741c4
| d7abb771bd5a941b26144ba400a34563a1afa589 | openssh-portable | neuralsentry | 1 | https://github.com/openssh/openssh-portable | https://github.com/openssh/openssh-portable/commit/d7abb771bd5a941b26144ba400a34563a1afa589 | 2017-02-28 06:10:08+00:00 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.