From owner-svn-src-releng@freebsd.org Thu Aug 10 06:59:45 2017 Return-Path: Delivered-To: svn-src-releng@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 617C7DC7251; Thu, 10 Aug 2017 06:59:45 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 2E1D172DBC; Thu, 10 Aug 2017 06:59:45 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id v7A6xi18046170; Thu, 10 Aug 2017 06:59:44 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id v7A6xh3e046167; Thu, 10 Aug 2017 06:59:43 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201708100659.v7A6xh3e046167@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Thu, 10 Aug 2017 06:59:43 +0000 (UTC) To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-releng@freebsd.org Subject: svn commit: r322344 - in releng/10.3: . crypto/openssh sys/conf X-SVN-Group: releng X-SVN-Commit-Author: delphij X-SVN-Commit-Paths: in releng/10.3: . crypto/openssh sys/conf X-SVN-Commit-Revision: 322344 X-SVN-Commit-Repository: base MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-releng@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the release engineering / security commits to the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Aug 2017 06:59:45 -0000 Author: delphij Date: Thu Aug 10 06:59:43 2017 New Revision: 322344 URL: https://svnweb.freebsd.org/changeset/base/322344 Log: Fix OpenSSH Denial of Service vulnerability. [SA-17:06] Approved by: so Modified: releng/10.3/UPDATING releng/10.3/crypto/openssh/auth-passwd.c releng/10.3/sys/conf/newvers.sh Modified: releng/10.3/UPDATING ============================================================================== --- releng/10.3/UPDATING Thu Aug 10 06:59:26 2017 (r322343) +++ releng/10.3/UPDATING Thu Aug 10 06:59:43 2017 (r322344) @@ -16,6 +16,10 @@ from older versions of FreeBSD, try WITHOUT_CLANG to b stable/10, and then rebuild without this option. The bootstrap process from older version of current is a bit fragile. +20170810 p21 FreeBSD-SA-17:06.openssh + + Fix OpenSSH Denial of Service vulnerability. [SA-17:06] + 20170712 p20 FreeBSD-SA-17:05.heimdal FreeBSD-EN-17:06.hyperv Modified: releng/10.3/crypto/openssh/auth-passwd.c ============================================================================== --- releng/10.3/crypto/openssh/auth-passwd.c Thu Aug 10 06:59:26 2017 (r322343) +++ releng/10.3/crypto/openssh/auth-passwd.c Thu Aug 10 06:59:43 2017 (r322344) @@ -66,6 +66,8 @@ extern login_cap_t *lc; #define DAY (24L * 60 * 60) /* 1 day in seconds */ #define TWO_WEEKS (2L * 7 * DAY) /* 2 weeks in seconds */ +#define MAX_PASSWORD_LEN 1024 + void disable_forwarding(void) { @@ -86,6 +88,9 @@ auth_password(Authctxt *authctxt, const char *password #if defined(USE_SHADOW) && defined(HAS_SHADOW_EXPIRE) static int expire_checked = 0; #endif + + if (strlen(password) > MAX_PASSWORD_LEN) + return 0; #ifndef HAVE_CYGWIN if (pw->pw_uid == 0 && options.permit_root_login != PERMIT_YES) Modified: releng/10.3/sys/conf/newvers.sh ============================================================================== --- releng/10.3/sys/conf/newvers.sh Thu Aug 10 06:59:26 2017 (r322343) +++ releng/10.3/sys/conf/newvers.sh Thu Aug 10 06:59:43 2017 (r322344) @@ -32,7 +32,7 @@ TYPE="FreeBSD" REVISION="10.3" -BRANCH="RELEASE-p20" +BRANCH="RELEASE-p21" if [ "X${BRANCH_OVERRIDE}" != "X" ]; then BRANCH=${BRANCH_OVERRIDE} fi