commit_msg
stringlengths
1
24.2k
commit_hash
stringlengths
2
84
project
stringlengths
2
40
source
stringclasses
4 values
labels
int64
0
1
repo_url
stringlengths
26
70
commit_url
stringlengths
74
118
commit_date
stringlengths
25
25
Fix ifdefs to not mask needed bits.
5fe81da22652f8caa63e9e3a1af519a85d36337e
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/5fe81da22652f8caa63e9e3a1af519a85d36337e
2019-10-28 21:19:47+11:00
upstream: fix SEGV in UpdateHostkeys debug() message, triggered when the update removed more host keys than remain present. Fix tested by reporter James Cook, via bugs@ OpenBSD-Commit-ID: 44f641f6ee02bb957f0c1d150495b60cf7b869d3
2e1efcfd9f94352ca5f4b6958af8a454f8cf48cd
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/2e1efcfd9f94352ca5f4b6958af8a454f8cf48cd
2021-05-26 01:47:24+00:00
upstream: fix incorrect plural; from Ville Skyt =?UTF-8?q?t=C3=A4=20via=20GHPR#181?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit OpenBSD-Commit-ID: 92f31754c6296d8f403d7c293e09dc27292d22c9
460aee9298f365357e9fd26851c22e0dca51fd6a
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/460aee9298f365357e9fd26851c22e0dca51fd6a
2021-04-03 05:46:41+00:00
fixup! if -s & -p specified, mention 'sftp -P' on success SSH-Copy-ID-Upstream: 32686e7c65b4fa2846e474d3315102dfa0f043b0
2709809fd616a0991dc18e3a58dea10fb383c3f0
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/2709809fd616a0991dc18e3a58dea10fb383c3f0
2023-05-24 19:41:14+02:00
Skip connection-timeout when missing FD passing. This tests uses multiplexing which uses file descriptor passing, so skip it if we don't have that. Fixes test failures on Cygwin.
c3ffb54b4fc5e608206037921db6ccbc2f5ab25f
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/c3ffb54b4fc5e608206037921db6ccbc2f5ab25f
2023-01-25 21:58:40+11:00
Fix memory leak in error path. *info is allocated via xstrdup but was leaked in the PAM_AUTH_ERR path. From github PR#266.
1ff38f34b4c4545eb28106629cafa1e0496bc726
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/1ff38f34b4c4545eb28106629cafa1e0496bc726
2021-08-11 18:07:58+05:00
upstream commit Filter debug messages out of log before picking the last two lines. Should prevent problems if any more debug output is added late in the connection. Upstream-Regress-ID: 345d0a9589c381e7d640a4ead06cfaadf4db1363
331b8e07ee5bcbdca12c11cc8f51a7e8de09b248
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/331b8e07ee5bcbdca12c11cc8f51a7e8de09b248
2016-03-04 02:48:06+00:00
Fix pasto in fallback code. There is no parameter called "pathname", it should simply be "path". bz#3059, patch from samuel at cendio.se.
d0e51810f332fe44ebdba41113aacf319d35f5a5
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d0e51810f332fe44ebdba41113aacf319d35f5a5
2019-08-24 15:12:11+10:00
upstream commit log debug messages sent to peer; ok deraadt markus Upstream-ID: 3b4fdc0a06ea5083f61d96e20043000f477103d9
eb80e26a15c10bc65fed8b8cdb476819a713c0fd
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/eb80e26a15c10bc65fed8b8cdb476819a713c0fd
2017-10-13 21:13:54+00:00
upstream commit Reduce timing attack against obsolete CBC modes by always computing the MAC over a fixed size of data. Reported by Jean Paul Degabriele, Kenny Paterson, Torben Hansen and Martin Albrecht. ok djm@ Upstream-ID: f20a13279b00ba0afbacbcc1f04e62e9d41c2912
b98a2a8348e907b3d71caafd80f0be8fdd075943
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/b98a2a8348e907b3d71caafd80f0be8fdd075943
2016-07-18 11:35:33+00:00
disable SANDBOX_SECCOMP_FILTER_DEBUG It was mistakenly enabled in 2580916e4872 Reported by Peter sec-openssh-com.22.fichtner AT 0sg.net
bc234605fa3eb10f56bf0d74c8ecb0d91ada9d05
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/bc234605fa3eb10f56bf0d74c8ecb0d91ada9d05
2022-12-07 18:38:25+11:00
upstream commit fix matching for pattern lists that contain a single negated match, e.g. "Host !example" report and patch from Robin Becker. bz#1918 ok dtucker@ Upstream-ID: 05a0cb323ea4bc20e98db099b42c067bfb9ea1ea
4067ec8a4c64ccf16250c35ff577b4422767da64
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/4067ec8a4c64ccf16250c35ff577b4422767da64
2016-08-23 03:22:49+00:00
fix netcat build problem
afbd9ec9e2dbad04834ce7ce53e58740434f32a5
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/afbd9ec9e2dbad04834ce7ce53e58740434f32a5
2020-10-17 11:33:13+11:00
fix newline escaping for unsupported_algorithms The hmac-ripemd160 was incorrect and could lead to broken Makefiles on systems that lacked support for it, but I made all the others consistent too.
679ce88ec2a8e2fe6515261c489e8c1449bb9da9
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/679ce88ec2a8e2fe6515261c489e8c1449bb9da9
2016-07-15 13:44:38+10:00
upstream: fix memleak on session-bind path; from Pedro Martelletto, ok dtucker@ OpenBSD-Commit-ID: e85899a26ba402b4c0717b531317e8fc258f0a7e
247082b5013f0d4fcae8f97453f2a2f01bcda811
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/247082b5013f0d4fcae8f97453f2a2f01bcda811
2022-04-29 03:13:32+00:00
Add includes to ptimeout test. Fixes test failures on AIX due to type mismatches.
ef798bad38505f7bf1b5fa5c0843dfc5a2b192b9
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/ef798bad38505f7bf1b5fa5c0843dfc5a2b192b9
2023-02-20 17:37:15+05:30
upstream commit Add missing braces; fixes 'write: Socket is not connected' error in ssh. ok deraadt@ OpenBSD-Commit-ID: db73a3a9e147722d410866cac34d43ed52e1ad24
a60c5dcfa2538ffc94dc5b5adb3db5b6ed905bdb
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/a60c5dcfa2538ffc94dc5b5adb3db5b6ed905bdb
2018-01-23 18:33:49+00:00
fix URL for connect.c
a4f5b507c708cc3dc2c8dd2d02e4416d7514dc23
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/a4f5b507c708cc3dc2c8dd2d02e4416d7514dc23
2015-08-21 14:43:55+10:00
upstream commit fix (another) problem in PermitOpen introduced during the channels.c refactor: the third and subsequent arguments to PermitOpen were being silently ignored; ok markus@ Upstream-ID: 067c89f1f53cbc381628012ba776d6861e6782fd
69bda0228861f3dacd4fb3d28b60ce9d103d254b
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/69bda0228861f3dacd4fb3d28b60ce9d103d254b
2017-10-04 18:49:30+00:00
Fix custom OpenSSL tests. Check out specified OpenSSL version. Install custom libcrypto where configure expects to find it. Remove unneeded OpenSSL config time options. Older OpenSSL versions were not make -j safe so remove it.
b3cc9fbdff2782eca79e33e02ac22450dc63bce9
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/b3cc9fbdff2782eca79e33e02ac22450dc63bce9
2021-04-27 09:18:02+10:00
upstream: spelling; OpenBSD-Commit-ID: db542918185243bea17202383a581851736553cc
f535ff922a67d9fcc5ee69d060d1b21c8bb01d14
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/f535ff922a67d9fcc5ee69d060d1b21c8bb01d14
2018-06-19 05:36:57+00:00
upstream: Fix two race conditions in sshd relating to SIGHUP: 1. Recently-forked child processes will briefly remain listening to listen_socks. If the main server sshd process completes its restart via execv() before these sockets are closed by the child processes then it can fail to listen at the desired addresses/ports and/or fail to restart. 2. When a SIGHUP is received, there may be forked child processes that are awaiting their reexecution state. If the main server sshd process restarts before passing this state, these child processes will yield errors and use a fallback path of reading the current sshd_config from the filesystem rather than use the one that sshd was started with. To fix both of these cases, we reuse the startup_pipes that are shared between the main server sshd and forked children. Previously this was used solely to implement tracking of pre-auth child processes for MaxStartups, but this extends the messaging over these pipes to include a child->parent message that the parent process is safe to restart. This message is sent from the child after it has completed its preliminaries: closing listen_socks and receiving its reexec state. bz#2953, reported by Michal Koutný; ok markus@ dtucker@ OpenBSD-Commit-ID: 7df09eacfa3ce13e9a7b1e9f17276ecc924d65ab
76a24b3fa193a9ca3e47a8779d497cb06500798b
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/76a24b3fa193a9ca3e47a8779d497cb06500798b
2019-03-01 02:32:39+00:00
upstream: fix integer overflow in XMSS private key parsing. Reported by Adam Zabrocki via SecuriTeam's SSH program. Note that this code is experimental and not compiled by default. ok markus@ OpenBSD-Commit-ID: cd0361896d15e8a1bac495ac583ff065ffca2be1
a546b17bbaeb12beac4c9aeed56f74a42b18a93a
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/a546b17bbaeb12beac4c9aeed56f74a42b18a93a
2019-10-09 00:02:57+00:00
upstream: fix breakage of -W forwaring introduced in 1.554; reported by naddy@ and sthen@, ok sthen@ OpenBSD-Commit-ID: f72558e643a26dc4150cff6e5097b5502f6c85fd
c4902e1a653c67fea850ec99c7537f358904c0af
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/c4902e1a653c67fea850ec99c7537f358904c0af
2021-05-17 11:43:16+00:00
upstream: fix compilation with DEBUG_KEXDH; bz#3160 ok dtucker@ OpenBSD-Commit-ID: 832e771948fb45f2270e8b8895aac36d176ba17a
ecb2c02d994b3e21994f31a70ff911667c262f1f
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/ecb2c02d994b3e21994f31a70ff911667c262f1f
2020-05-08 05:13:14+00:00
upstream: fix miscellaneous text problems; ok djm@ OpenBSD-Commit-ID: 0cbf411a14d8fa0b269b69cbb1b4fc0ca699fe9f
ad38406fc95fa223b0ef2edf8ff50508f8ab1cb6
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/ad38406fc95fa223b0ef2edf8ff50508f8ab1cb6
2019-11-01 12:10:43+00:00
fix broken case statement in previous
5fd922ade1b25880fe8a8249f5c0385e413108f9
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/5fd922ade1b25880fe8a8249f5c0385e413108f9
2022-06-24 14:43:54+10:00
upstream: fix some memleaks in test_helper code bz#3037 from Jitendra Sharma OpenBSD-Regress-ID: 71440fa9186f5842a65ce9a27159385c6cb6f751
c4ffb72593c08921cf9291bc05a5ef1d0aaa6891
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/c4ffb72593c08921cf9291bc05a5ef1d0aaa6891
2019-08-02 01:41:24+00:00
upstream commit Fix typo in previous
43beea053db191cac47c2cd8d3dc1930158aff1a
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/43beea053db191cac47c2cd8d3dc1930158aff1a
2015-04-28 10:25:15+00:00
Resync fmt_scaled. with OpenBSD. Fixes underflow reported in bz#3401.
2893c5e764557f48f9d6a929e224ed49c59545db
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/2893c5e764557f48f9d6a929e224ed49c59545db
2022-03-11 18:43:58+11:00
Fix misspellings of regress CONFOPTS env variables. Patch from Bryan Drewery.
d9b9b43656091cf0ad55c122f08fadb07dad0abd
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d9b9b43656091cf0ad55c122f08fadb07dad0abd
2015-04-07 09:10:00+10:00
harden Linux seccomp sandbox Linux mmap(2) and madvise(2) syscalls support quite a number of funky flags that we don't expect that sshd/libc will ever need. We can exclude this kernel attack surface by filtering the mmap(2) flags and the madvise(2) advice arguments. Similarly, the sandboxed process in sshd is a single-threaded program that does not use shared memory for synchronisation or communication. Therefore, there should be no reason for the advanced priority inheritance futex(2) operations to be necessary. These can also be excluded. Motivated by Jann Horn pointing out that there have been kernel bugs in nearby Linux kernel code, e.g. CVE-2020-29368, CVE-2020-29374 and CVE-2022-42703. Feedback Jann Horn, ok dtucker@
195313dfe10a23c82e9d56d5fdd2f59beee1bdcf
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/195313dfe10a23c82e9d56d5fdd2f59beee1bdcf
2023-02-03 16:33:09+11:00
Fix signedness bug in Cygwin code The Cygwin-specific pattern match code has a bug. It checks the size_t value returned by mbstowcs for being < 0. The right thing to do is to check against (size_t) -1. Fix that. Signed-off-by: Corinna Vinschen <[email protected]>
68085066b6bad43643b43f5957fcc5fd34782ccd
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/68085066b6bad43643b43f5957fcc5fd34782ccd
2022-01-21 03:22:56+11:00
upstream: fix a bug I introduced in r1.406: when printing private key fingerprint of old-format key, key comments were not being displayed. Spotted by loic AT venez.fr, ok dtucker OpenBSD-Commit-ID: 2d98e4f9eb168eea733d17e141e1ead9fe26e533
a98d5ba31e5e7e01317352f85fa63b846a960f8c
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/a98d5ba31e5e7e01317352f85fa63b846a960f8c
2020-04-20 04:43:57+00:00
fix typo that prevented detection of Linux VRF Reported by hexiaowen AT huawei.com
8729498a5d239980a91d32f031b34e8c58c52f62
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/8729498a5d239980a91d32f031b34e8c58c52f62
2019-07-10 09:43:19+10:00
fix key-options.sh on platforms without openpty(3) Skip the pty tests if the platform lacks openpty(3) and has to chown(2) the pty device explicitly. This typically requires root permissions that this test lacks. bz#2856 ok dtucker@
54268d589e85ecc43d3eba8d83f327bdada9d696
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/54268d589e85ecc43d3eba8d83f327bdada9d696
2018-05-11 14:04:40+10:00
Fix typos in INSTALL: s/avilable/available/ s/suppports/supports/
11d427162778c18fa42917893a75d178679a2389
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/11d427162778c18fa42917893a75d178679a2389
2020-02-14 16:14:23+09:00
upstream: fix ssh-keysign fd handling problem introduced in r1.304 caused by a typo (STDIN_FILENO vs STDERR_FILENO) OpenBSD-Commit-ID: 57a0b4be7bef23963afe24150e24bf014fdd9cb0
c586d2d3129265ea64b12960c379d634bccb6535
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/c586d2d3129265ea64b12960c379d634bccb6535
2019-05-31 03:20:07+00:00
fix FIDO key support for !OPENSSL_HAS_ECC case ok dtucker
872595572b6c9a584ed754165e8b7c4c9e7e1d61
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/872595572b6c9a584ed754165e8b7c4c9e7e1d61
2021-10-01 16:35:05+10:00
upstream: Fix up whitespace left by previous change removing privsep. No other changes. OpenBSD-Regress-ID: 87adec225d8afaee4d6a91b2b71203f52bf14b15
76a398edfb51951b2d65d522d7b02c72304db300
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/76a398edfb51951b2d65d522d7b02c72304db300
2021-09-30 05:26:26+00:00
Fix mem leak in unit test. Patch from jitendra.sharma at intel.com.
d46075b923bf25e6f25959a3f5b458852161cb3e
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d46075b923bf25e6f25959a3f5b458852161cb3e
2019-08-05 21:36:48+10:00
Fix merge conflict.
f58acaf8c7315483f4ac87d46a1aa2142a713cd8
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/f58acaf8c7315483f4ac87d46a1aa2142a713cd8
2022-11-07 15:10:59+11:00
upstream commit Fix public key authentication when multiple authentication is in use. Instead of deleting and re-preparing the entire keys list, just reset the 'used' flags; the keys list is already in a good order (with already- tried keys at the back) Analysis and patch from Vincent Brillault on bz#2642; ok dtucker@ Upstream-ID: 7123f12dc2f3bcaae715853035a97923d7300176
b9844a45c7f0162fd1b5465683879793d4cc4aaa
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/b9844a45c7f0162fd1b5465683879793d4cc4aaa
2016-12-04 23:54:02+00:00
Fix error message w/out nistp521. Correct error message when OpenSSL doesn't support certain ECDSA key lengths.
9b47b083ca9d866249ada9f02dbd57c87b13806e
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/9b47b083ca9d866249ada9f02dbd57c87b13806e
2018-11-08 22:41:59-08:00
upstream: Fix a couple of whitespace things. Portable already has these so this removes two diffs between the two. OpenBSD-Commit-ID: 769f017ebafd8e741e337b3e9e89eb5ac73c9c56
b5d23150b4e3368f4983fd169d432c07afeee45a
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/b5d23150b4e3368f4983fd169d432c07afeee45a
2021-07-05 01:21:07+00:00
Fix syntax error on Linux/X32 Patch from Mike Frysinger
6b853c6f8ba5eecc50f3b57af8e63f8184eb0fa6
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/6b853c6f8ba5eecc50f3b57af8e63f8184eb0fa6
2017-03-21 08:47:55+11:00
upstream commit Fix printing (ssh -G ...) of HostKeyAlgorithms=+... Reported by Bryan Drewery Upstream-ID: 19ad20c41bd5971e006289b6f9af829dd46c1293
60a92470e21340e1a3fc10f9c7140d8e1519dc55
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/60a92470e21340e1a3fc10f9c7140d8e1519dc55
2015-08-21 23:53:08+00:00
fix kex test
1ca3e2155aa5d3801a7ae050f85c71f41fcb95b1
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/1ca3e2155aa5d3801a7ae050f85c71f41fcb95b1
2015-01-20 10:11:31+11:00
Fix sshbuf_new error path in skey.
416287d45fcde0a8e66eee8b99aa73bd58607588
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/416287d45fcde0a8e66eee8b99aa73bd58607588
2018-07-11 10:10:26+10:00
upstream commit fix three bugs in KRL code related to (unused) signature support: verification length was being incorrectly calculated, multiple signatures were being incorrectly processed and a NULL dereference that occurred when signatures were verified. Reported by Carl Jackson Upstream-ID: e705e97ad3ccce84291eaa651708dd1b9692576b
422d1b3ee977ff4c724b597fb2e437d38fc8de9d
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/422d1b3ee977ff4c724b597fb2e437d38fc8de9d
2015-12-31 00:33:52+00:00
upstream: ssh-keygen: fix touch prompt, pin retries; part of GHPR329 from Pedro Martelletto OpenBSD-Commit-ID: 75d1005bd2ef8f29fa834c90d2684e73556fffe8
f208e3b9ffb5ee76cf9c95df7ff967adc7f51c7d
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/f208e3b9ffb5ee76cf9c95df7ff967adc7f51c7d
2022-07-20 03:33:22+00:00
upstream: Fix typo. From AlexanderStohr via github PR#343. OpenBSD-Commit-ID: a134c9b4039e48803fc6a87f955b0f4a03181497
4cf8d0c0f3030f594a238bab21a0695735515487
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/4cf8d0c0f3030f594a238bab21a0695735515487
2022-09-21 22:26:50+00:00
Determine appropriate salt for invalid users. When sshd is processing a non-PAM login for a non-existent user it uses the string from the fakepw structure as the salt for crypt(3)ing the password supplied by the client. That string has a Blowfish prefix, so on systems that don't understand that crypt will fail fast due to an invalid salt, and even on those that do it may have significantly different timing from the hash methods used for real accounts (eg sha512). This allows user enumeration by, eg, sending large password strings. This was noted by EddieEzra.Harari at verint.com (CVE-2016-6210). To mitigate, use the same hash algorithm that root uses for hashing passwords for users that do not exist on the system. ok djm@
9286875a73b2de7736b5e50692739d314cd8d9dc
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/9286875a73b2de7736b5e50692739d314cd8d9dc
2016-07-15 13:32:45+10:00
upstream: fix edit mistake; spotted by jmc@ OpenBSD-Commit-ID: dd724e1c52c9d6084f4cd260ec7e1b2b138261c6
f0fcd7e65087db8c2496f13ed39d772f8e38b088
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/f0fcd7e65087db8c2496f13ed39d772f8e38b088
2018-09-12 06:18:59+00:00
Add missing bracket in EGD seeding code. When configured --with-prngd-socket the code had a missing bracket after an API change. Fix that and a couple of warnings. bz#3032 , from ole.weidner at protonmail.ch
01a1e21cd55d99293c8ff8ed7c590f2ee440da43
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/01a1e21cd55d99293c8ff8ed7c590f2ee440da43
2019-07-06 12:00:41+10:00
Fix tunnel forwarding broken in 7.7p1 bz2855, ok dtucker@
cfb1d9bc76734681e3dea532a1504fcd466fbe91
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/cfb1d9bc76734681e3dea532a1504fcd466fbe91
2018-04-13 13:38:06+10:00
upstream: fix memory leak in error path; bz#3074 patch from [email protected], ok dtucker OpenBSD-Commit-ID: d031853f3ecf47b35a0669588f4d9d8e3b307b3c
07f2c7f34951c04d2cd796ac6c80e47c56c4969e
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/07f2c7f34951c04d2cd796ac6c80e47c56c4969e
2019-10-04 04:31:59+00:00
configure.ac: fix ldns test When running ./configure --with-ldns, if ldns-config cannot be found, we add -Iyes/include to CPPFLAGS and -Lyes/lib to LDFLAGS. Fix that.
0c428c0e991e2c4fabc48cf5d9b8f84c9412e0c3
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/0c428c0e991e2c4fabc48cf5d9b8f84c9412e0c3
2020-01-20 13:58:11+01:00
upstream commit Fix \-escaping bug that caused forward path parsing to skip two characters and skip past the end of the string. Based on patch by Salvador Fandino; ok dtucker@ Upstream-ID: 7b879dc446335677cbe4cb549495636a0535f3bd
78c2a4f883ea9aba866358e2acd9793a7f42ca93
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/78c2a4f883ea9aba866358e2acd9793a7f42ca93
2015-06-26 05:13:20+00:00
upstream commit Validate address ranges for AllowUser/DenyUsers at configuration load time and refuse to accept bad ones. It was previously possible to specify invalid CIDR address ranges (e.g. [email protected]/55) and these would always match. Thanks to Laurence Parry for a detailed bug report. ok markus (for a previous diff version) Upstream-ID: 9dfcdd9672b06e65233ea4434c38226680d40bfb
010359b32659f455fddd2bd85fd7cc4d7a3b994a
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/010359b32659f455fddd2bd85fd7cc4d7a3b994a
2016-11-06 05:46:37+00:00
upstream: fix memleaks in private key deserialisation; enforce more consistency between redundant fields in private key certificate and private key body; ok markus@ OpenBSD-Commit-ID: dec344e414d47f0a7adc13aecf3760fe58101240
f71219a01d8f71c4b3ed7e456337a84ddba1653e
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/f71219a01d8f71c4b3ed7e456337a84ddba1653e
2021-02-02 22:36:46+00:00
upstream: more strictly enforce KEX state-machine by banning packet types once they are received. Fixes memleak caused by duplicate SSH2_MSG_KEX_DH_GEX_REQUEST (spotted by portable OpenSSH kex_fuzz via oss-fuzz #30078). ok markus@ OpenBSD-Commit-ID: 87331c715c095b587d5c88724694cdeb701c9def
3dd0c64e08f1bba21d71996d635c7256c8c139d1
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/3dd0c64e08f1bba21d71996d635c7256c8c139d1
2021-01-31 22:55:29+00:00
upstream commit Back out 'plug memleak'. Upstream-ID: 4faacdde136c24a961e24538de373660f869dbc0
7ec4946fb686813eb5f8c57397e465f5485159f4
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/7ec4946fb686813eb5f8c57397e465f5485159f4
2016-05-24 02:31:57+00:00
upstream: silence (to log level debug2) failure messages when loading the default hostkeys. Hostkeys explicitly specified in the configuration or on the command-line are still reported as errors, and failure to load at least one host key remains a fatal error. MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Based on patch from Dag-Erling Smørgrav via https://github.com/openssh/openssh-portable/pull/103 ok markus@ OpenBSD-Commit-ID: ffc2e35a75d1008effaf05a5e27425041c27b684
928f1231f65f88cd4c73e6e0edd63d2cf6295d77
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/928f1231f65f88cd4c73e6e0edd63d2cf6295d77
2018-11-19 04:12:32+00:00
upstream commit Fix bug introduced in rev 1.467 which causes "buffer_get_bignum_ret: incomplete message" errors when built with WITH_SSH1 and run such that no Protocol 1 ephemeral host key is generated (eg "Protocol 2", no SSH1 host key supplied). Reported by rainer.laatsch at t-online.de, ok deraadt@ Upstream-ID: aa6b132da5c325523aed7989cc5a320497c919dc
e600348a7afd6325cc5cd783cb424065cbc20434
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/e600348a7afd6325cc5cd783cb424065cbc20434
2016-08-03 04:23:55+00:00
Check for and work around buggy fflush(NULL). Some really old platforms (eg SunOS4) segfault on fflush(NULL) so check for and work around. With klausz at haus-gisela.de.
58fd4c5c0140f6636227ca7acbb149ab0c2509b9
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/58fd4c5c0140f6636227ca7acbb149ab0c2509b9
2018-03-05 19:28:08+11:00
upstream: memleak on error path; ok markus@ OpenBSD-Commit-ID: 2091a36d6ca3980c81891a6c4bdc544e63cb13a8
3287790e78bf5b53c4a3cafb67bb5aa03e3910f0
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/3287790e78bf5b53c4a3cafb67bb5aa03e3910f0
2021-02-02 22:35:14+00:00
upstream: less confusing debug message; bz#3365 OpenBSD-Commit-ID: 836268d3642c2cdc84d39b98d65837f5241e4a50
199c4df66c0e39dd5c3333b162af274678c0501d
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/199c4df66c0e39dd5c3333b162af274678c0501d
2021-11-18 21:32:11+00:00
upstream: Save debug logs from ssh for debugging purposes. OpenBSD-Regress-ID: 109e40b06de1c006a3b8e0d8745b790b2c5870a0
344a0e8240eaf08da5d46a5e3a9ecad6e4f64c35
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/344a0e8240eaf08da5d46a5e3a9ecad6e4f64c35
2023-01-06 08:50:33+00:00
upstream: Remove now-unused compat bit SSH_BUG_RSASIGMD5. The code to set this was removed in OpenSSH 7.7 when support for SSH implementations dating back to before RFC standardization were removed. "burn it all" djm@ OpenBSD-Commit-ID: 6330935fbe23dd00be79891505e06d1ffdac7cda
2a7e3449908571af601a4c2d12ab140096442e47
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/2a7e3449908571af601a4c2d12ab140096442e47
2023-02-17 04:22:50+00:00
upstream commit add a debug2() right before DNS resolution; it's a place where ssh could previously silently hang for a while. bz#2433 Upstream-ID: 52a1a3e0748db66518e7598352c427145692a6a0
a85768a9321d74b41219eeb3c9be9f1702cbf6a5
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/a85768a9321d74b41219eeb3c9be9f1702cbf6a5
2015-09-04 04:56:09+00:00
upstream: memleaks; found by valgrind OpenBSD-Commit-ID: 6c3ba22be53e753c899545f771e8399fc93cd844
de2997a4cf22ca0a524f0e5b451693c583e2fd89
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/de2997a4cf22ca0a524f0e5b451693c583e2fd89
2018-07-16 03:09:13+00:00
Prevent excessively long username going to PAM. This is a mitigation for a buffer overflow in Solaris' PAM username handling (CVE-2020-14871), and is only enabled for Sun-derived PAM implementations. This is not a problem in sshd itself, it only prevents sshd from being used as a vector to attack Solaris' PAM. It does not prevent the bug in PAM from being exploited via some other PAM application. Based on github PR#212 from Mike Scott but implemented slightly differently. ok tim@ djm@
fcf429a4c69d30d8725612a55b37181594da8ddf
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/fcf429a4c69d30d8725612a55b37181594da8ddf
2020-11-11 12:30:46+11:00
upstream: remove debugging goop that snuck in to last commit OpenBSD-Commit-ID: 8ea4455a2d9364a0a04f9e4a2cbfa4c9fcefe77e
575d0042a94997c1eeb86a6dcfb30b3c7bdbcba3
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/575d0042a94997c1eeb86a6dcfb30b3c7bdbcba3
2019-11-14 21:56:52+00:00
upstream: tweak debug message OpenBSD-Commit-ID: 2bf336d3be0b7e3dd97920d7e7471146a281d2b9
9a1225e8ca2ce1fe809910874935302234399a6d
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/9a1225e8ca2ce1fe809910874935302234399a6d
2019-11-16 23:17:20+00:00
Refuse to use OpenSSL 3.0.4 due to potential RCE. OpenSSL has a potential RCE in its RSA implementation (CVE-2022-2274) so refuse to use that specific version.
d9eaea4bea6271bcee6a2b9428f1271faf2d033b
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d9eaea4bea6271bcee6a2b9428f1271faf2d033b
2022-07-12 12:54:49+10:00
upstream: ssh: The client configuration keyword is "hostbasedacceptedalgorithms" This fixes a mistake that slipped in when "HostbasedKeyTypes" was renamed to "HostbasedAcceptedAlgorithms". Bug report by [email protected] OpenBSD-Commit-ID: d745a7e8e50b2589fc56877f322ea204bc784f38
9acd76e6e4d2b519773e7119c33cf77f09534909
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/9acd76e6e4d2b519773e7119c33cf77f09534909
2021-05-23 18:22:57+00:00
upstream: properly fix ProxyJump parsing; Thanks to tb@ for pointing out my error (parse_ssh_uri() can return -1/0/1, that I missed). Reported by Raf Czlonka via bugs@ ok tb@ OpenBSD-Commit-ID: a2991a3794bcaf1ca2b025212cce11cdb5f6b7d6
a11ca015879eab941add8c6bdaaec7d41107c6f5
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/a11ca015879eab941add8c6bdaaec7d41107c6f5
2020-12-21 09:19:53+00:00
upstream: memleak on error path; found by libfuzzer OpenBSD-Commit-ID: 34d44cb0fb5bdb5fcbc6b02b804e71b20a7a5fc7
69159afe24120c97e5ebaf81016c85968afb903e
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/69159afe24120c97e5ebaf81016c85968afb903e
2019-09-05 05:42:59+00:00
upstream: fix some corner-case bugs in scp sftp-mode handling of ~-prefixed paths; spotted by jsg; feedback jsg & deraadt, ok jsg & markus OpenBSD-Commit-ID: d1697dbaaa9f0f5649d69be897eab25c7d37c222
63670d4e9030bcee490d5a9cce561373ac5b3b23
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/63670d4e9030bcee490d5a9cce561373ac5b3b23
2022-01-08 07:36:11+00:00
upstream commit fix bug in previous; was printing incorrect string for failed host key algorithms negotiation Upstream-ID: 22c0dc6bc61930513065d92e11f0753adc4c6e6e
5cefe769105a2a2e3ca7479d28d9a325d5ef0163
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/5cefe769105a2a2e3ca7479d28d9a325d5ef0163
2015-07-29 08:34:54+00:00
upstream: Remove leftover debugging. OpenBSD-Regress-ID: 3d86c3d4867e46b35af3fd2ac8c96df0ffdcfeb9
8fe25440206319d15b52d12b948a5dfdec14dca3
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/8fe25440206319d15b52d12b948a5dfdec14dca3
2019-01-28 03:28:10+00:00
upstream commit Fix two rare edge cases: 1. If vasprintf() returns < 0, do not access a NULL pointer in snmprintf(), and do not free() the pointer returned from vasprintf() because on some systems other than OpenBSD, it might be a bogus pointer. 2. If vasprintf() returns == 0, return 0 and "" rather than -1 and NULL. Besides, free(dst) is pointless after failure (not a bug). One half OK martijn@, the other half OK deraadt@; committing quickly before people get hurt. Upstream-Regress-ID: b164f20923812c9bac69856dbc1385eb1522cba4
75f0844b4f29d62ec3a5e166d2ee94b02df819fc
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/75f0844b4f29d62ec3a5e166d2ee94b02df819fc
2016-05-30 12:05:56+00:00
upstream: spelling OpenBSD-Commit-ID: c63e43087a64d0727af13409c708938e05147b62
c45a752f0de611afd87755c2887c8a24816d08ee
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/c45a752f0de611afd87755c2887c8a24816d08ee
2022-01-01 05:55:06+00:00
Output test debug logs on failure.
a09e98dcae1e26f026029b7142b0e0d10130056f
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/a09e98dcae1e26f026029b7142b0e0d10130056f
2020-08-07 15:37:37+10:00
upstream: put back the mux_ctx memleak fix for SSH_CHANNEL_MUX_CLIENT OK mfriedl@ OpenBSD-Commit-ID: 1aba1da828956cacaadb81a637338734697d9798
d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd
2021-09-14 11:04:21+00:00
fix some bugs in the fuzzer
dc7bc52372f2744fa39191577be5306ee57aacd4
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/dc7bc52372f2744fa39191577be5306ee57aacd4
2022-05-30 09:29:09+10:00
upstream: support for using the SFTP protocol for file transfers in scp, via a new "-M sftp" option. Marked as experimental for now. Some corner-cases exist, in particular there is no attempt to provide bug-compatibility with scp's weird "double shell" quoting rules. Mostly by Jakub Jelen in GHPR#194 with some tweaks by me. ok markus@ Thanks jmc@ for improving the scp.1 bits. OpenBSD-Commit-ID: 6ce4c9157ff17b650ace571c9f7793d92874051c
197e29f1cca190d767c4b2b63a662f9a9e5da0b3
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/197e29f1cca190d767c4b2b63a662f9a9e5da0b3
2021-08-02 23:38:27+00:00
another spelling error in comment
397f217e8640e75bb719a8e87111b4bd848fb3df
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/397f217e8640e75bb719a8e87111b4bd848fb3df
2020-03-13 14:24:23+11:00
ignore PAM environment vars when UseLogin=yes If PAM is configured to read user-specified environment variables and UseLogin=yes in sshd_config, then a hostile local user may attack /bin/login via LD_PRELOAD or similar environment variables set via PAM. CVE-2015-8325, found by Shayan Sadigh, via Colin Watson
85bdcd7c92fe7ff133bbc4e10a65c91810f88755
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/85bdcd7c92fe7ff133bbc4e10a65c91810f88755
2016-04-13 10:39:57+10:00
upstream: spelling fix; OpenBSD-Commit-ID: 3c079523c4b161725a4b15dd06348186da912402
ba261a1dd33266168ead4f8f40446dcece4d1600
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/ba261a1dd33266168ead4f8f40446dcece4d1600
2020-01-31 22:25:59+00:00
upstream: fix debug statement OpenBSD-Commit-ID: 42c6edeeda5ce88b51a20d88c93be3729ce6b916
ebd29e90129cf18fedfcfe1de86e324228669295
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/ebd29e90129cf18fedfcfe1de86e324228669295
2020-04-03 04:06:26+00:00
upstream commit Fix typo in ~C error message for bad port forward cancellation. bz#2672, from Brad Marshall via Colin Watson and Ubuntu's bugtracker. Upstream-ID: 0d4a7e5ead6cc59c9a44b4c1e5435ab3aada09af
9390b0031ebd6eb5488d3bc4d4333c528dffc0a6
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/9390b0031ebd6eb5488d3bc4d4333c528dffc0a6
2017-01-29 21:35:23+00:00
upstream commit fix memory leak in error path ok djm@ Upstream-ID: dd2f402b0a0029b755df029fc7f0679e1365ce35
66d2e229baa9fe57b868c373b05f7ff3bb20055b
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/66d2e229baa9fe57b868c373b05f7ff3bb20055b
2015-10-21 11:33:03+00:00
upstream: fix bug that prevented certification of ed25519-sk keys OpenBSD-Commit-ID: 64c8cc6f5de2cdd0ee3a81c3a9dee8d862645996
740c4bc9875cbb4b9fc03fd5eac19df080f20df5
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/740c4bc9875cbb4b9fc03fd5eac19df080f20df5
2019-11-18 06:39:02+00:00
upstream: fix memory leak; Coverity CID 291848 with/ok dtucker@ OpenBSD-Commit-ID: 37f80cb5d075ead5a00ad1b74175684ab1156ff8
13ae327eae598b1043e5ec30e4b170edb3c898a5
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/13ae327eae598b1043e5ec30e4b170edb3c898a5
2023-03-29 00:18:35+00:00
upstream commit "commandline" -> "command line", since there are so few examples of the former in the pages, so many of the latter, and in some of these pages we had multiple spellings; prompted by tj Upstream-ID: 78459d59bff74223f8139d9001ccd56fc4310659
8b29008bbe97f33381d9b4b93fcfa304168d0286
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/8b29008bbe97f33381d9b4b93fcfa304168d0286
2015-11-05 09:48:05+00:00
upstream: fix typos in sk_enroll OpenBSD-Commit-ID: faa9bf779e008b3e64e2eb1344d9b7d83b3c4487
d431778a561d90131814f986b646299f9af33c8c
openssh-portable
neuralsentry
0
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d431778a561d90131814f986b646299f9af33c8c
2019-11-15 15:41:01+00:00
upstream: fix bug in client that was keeping a redundant ssh-agent socket around for the life of the connection; bz#2912; reported by Simon Tatham; ok dtucker@ OpenBSD-Commit-ID: 4ded588301183d343dce3e8c5fc1398e35058478
aaed635e3a401cfcc4cc97f33788179c458901c3
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/aaed635e3a401cfcc4cc97f33788179c458901c3
2018-11-16 02:46:20+00:00
upstream commit small memleak: free fd_set on connection timeout (though we are heading to exit anyway). From Tom Rix in bz#2683 Upstream-ID: 10e3dadbb8199845b66581473711642d9e6741c4
d7abb771bd5a941b26144ba400a34563a1afa589
openssh-portable
neuralsentry
1
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/d7abb771bd5a941b26144ba400a34563a1afa589
2017-02-28 06:10:08+00:00