diff --git a/fix-memory-leak-in-kex-exchange.patch b/fix-memory-leak-in-kex-exchange.patch new file mode 100644 index 0000000000000000000000000000000000000000..d14f64f39c7b00ddcca4f3196c32fffa0d6dbae1 --- /dev/null +++ b/fix-memory-leak-in-kex-exchange.patch @@ -0,0 +1,11 @@ +diff -Nur openssh-8.8p1_o/sshconnect2.c openssh-8.8p1/sshconnect2.c +--- openssh-8.8p1_o/sshconnect2.c 2024-01-26 14:23:51.435415796 +0800 ++++ openssh-8.8p1/sshconnect2.c 2024-01-26 14:24:25.908465344 +0800 +@@ -385,6 +385,7 @@ + free(prop_kex); + free(prop_enc); + free(prop_hostkey); ++ free(s); + } + + /* diff --git a/openssh.spec b/openssh.spec index e747362351968971175c618cb963a664c1957520..c39cafc51b4290e6118dd8f6e3091e5afca548d6 100644 --- a/openssh.spec +++ b/openssh.spec @@ -6,7 +6,7 @@ %{?no_gtk2:%global gtk2 0} %global sshd_uid 74 -%global openssh_release 26 +%global openssh_release 27 Name: openssh Version: 8.8p1 @@ -131,6 +131,7 @@ Patch100: backport-fix-CVE-2023-38408-upstream-terminate-process.patch Patch101: backport-upstream-In-channel_request_remote_forwarding-the-pa.patch Patch102: backport-CVE-2023-51385-upstream-ban-user-hostnames-with-most-shell-metachar.patch Patch103: backport-CVE-2023-48795.patch +Patch104: fix-memory-leak-in-kex-exchange.patch Requires: /sbin/nologin Requires: libselinux >= 2.3-5 audit-libs >= 1.0.8 @@ -312,6 +313,7 @@ popd %patch101 -p1 %patch102 -p1 %patch103 -p1 +%patch104 -p1 autoreconf pushd pam_ssh_agent_auth-pam_ssh_agent_auth-0.10.4 @@ -508,6 +510,12 @@ getent passwd sshd >/dev/null || \ %attr(0644,root,root) %{_mandir}/man8/sftp-server.8* %changelog +* Fri Jan 26 2024 songjuntao - 8.8p1-27 +- Type:bugfix +- CVE: +- SUG:NA +- DESC: fix memory leak in kex2 exchange function + * Wed Jan 10 2024 renmingshuai - 8.8p1-26 - Type:CVE - CVE:CVE-2023-48795