diff options
author | Archana Polampalli <archana.polampalli@windriver.com> | 2025-05-09 10:22:27 +0000 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2025-05-23 08:42:33 -0700 |
commit | 9d251db72285b3ca4a94d713c09ea055d20f7068 (patch) | |
tree | 7e645c8f7afc7db0245870d51a5c540313939084 | |
parent | e14b2fdbb74816d754b0b47fac69ad68bad597aa (diff) | |
download | poky-9d251db72285b3ca4a94d713c09ea055d20f7068.tar.gz |
openssh: fix CVE-2025-32728
In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the
documentation stating that it disables X11 and agent forwarding.
(From OE-Core rev: fff41e824bb56d4879c65d6dec3605fabb406071)
Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r-- | meta/recipes-connectivity/openssh/openssh/CVE-2025-32728.patch | 43 | ||||
-rw-r--r-- | meta/recipes-connectivity/openssh/openssh_9.9p2.bb | 1 |
2 files changed, 44 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh/CVE-2025-32728.patch b/meta/recipes-connectivity/openssh/openssh/CVE-2025-32728.patch new file mode 100644 index 0000000000..db47947b42 --- /dev/null +++ b/meta/recipes-connectivity/openssh/openssh/CVE-2025-32728.patch | |||
@@ -0,0 +1,43 @@ | |||
1 | From fc86875e6acb36401dfc1dfb6b628a9d1460f367 Mon Sep 17 00:00:00 2001 | ||
2 | From: "djm@openbsd.org" <djm@openbsd.org> | ||
3 | Date: Wed, 9 Apr 2025 07:00:03 +0000 | ||
4 | Subject: [PATCH] upstream: Fix logic error in DisableForwarding option. This | ||
5 | option | ||
6 | |||
7 | was documented as disabling X11 and agent forwarding but it failed to do so. | ||
8 | Spotted by Tim Rice. | ||
9 | |||
10 | OpenBSD-Commit-ID: fffc89195968f7eedd2fc57f0b1f1ef3193f5ed1 | ||
11 | |||
12 | Upstream-Status: Backport [https://github.com/openssh/openssh-portable/commit/fc86875e6acb36401dfc1dfb6b628a9d1460f367] | ||
13 | CVE: CVE-2025-32728 | ||
14 | Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> | ||
15 | --- | ||
16 | session.c | 5 +++-- | ||
17 | 1 file changed, 3 insertions(+), 2 deletions(-) | ||
18 | |||
19 | diff --git a/session.c b/session.c | ||
20 | index aa342e8..eb932b8 100644 | ||
21 | --- a/session.c | ||
22 | +++ b/session.c | ||
23 | @@ -2191,7 +2191,8 @@ session_auth_agent_req(struct ssh *ssh, Session *s) | ||
24 | if ((r = sshpkt_get_end(ssh)) != 0) | ||
25 | sshpkt_fatal(ssh, r, "%s: parse packet", __func__); | ||
26 | if (!auth_opts->permit_agent_forwarding_flag || | ||
27 | - !options.allow_agent_forwarding) { | ||
28 | + !options.allow_agent_forwarding || | ||
29 | + options.disable_forwarding) { | ||
30 | debug_f("agent forwarding disabled"); | ||
31 | return 0; | ||
32 | } | ||
33 | @@ -2586,7 +2587,7 @@ session_setup_x11fwd(struct ssh *ssh, Session *s) | ||
34 | ssh_packet_send_debug(ssh, "X11 forwarding disabled by key options."); | ||
35 | return 0; | ||
36 | } | ||
37 | - if (!options.x11_forwarding) { | ||
38 | + if (!options.x11_forwarding || options.disable_forwarding) { | ||
39 | debug("X11 forwarding disabled in server configuration file."); | ||
40 | return 0; | ||
41 | } | ||
42 | -- | ||
43 | 2.25.1 | ||
diff --git a/meta/recipes-connectivity/openssh/openssh_9.9p2.bb b/meta/recipes-connectivity/openssh/openssh_9.9p2.bb index 5191725796..8d3ea4d632 100644 --- a/meta/recipes-connectivity/openssh/openssh_9.9p2.bb +++ b/meta/recipes-connectivity/openssh/openssh_9.9p2.bb | |||
@@ -25,6 +25,7 @@ SRC_URI = "https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.ta | |||
25 | file://sshd_check_keys \ | 25 | file://sshd_check_keys \ |
26 | file://0001-regress-banner.sh-log-input-and-output-files-on-erro.patch \ | 26 | file://0001-regress-banner.sh-log-input-and-output-files-on-erro.patch \ |
27 | file://0001-regress-test-exec-use-the-absolute-path-in-the-SSH-e.patch \ | 27 | file://0001-regress-test-exec-use-the-absolute-path-in-the-SSH-e.patch \ |
28 | file://CVE-2025-32728.patch \ | ||
28 | " | 29 | " |
29 | SRC_URI[sha256sum] = "91aadb603e08cc285eddf965e1199d02585fa94d994d6cae5b41e1721e215673" | 30 | SRC_URI[sha256sum] = "91aadb603e08cc285eddf965e1199d02585fa94d994d6cae5b41e1721e215673" |
30 | 31 | ||