Package: release.debian.org Severity: normal Tags: stretch User: release.debian....@packages.debian.org Usertags: pu
This update for OpenSSH fixes a dead lock in AuthorizedKeysCommand (#905226). The fixed package is running fine on a formerly affected Stretch system (https://phabricator.wikimedia.org) (I'm not the maintainer, but acked by Colin in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905226#27) Debdiff below. Cheers, Moritz diff -Nru openssh-7.4p1/debian/changelog openssh-7.4p1/debian/changelog --- openssh-7.4p1/debian/changelog 2019-03-01 17:19:28.000000000 +0100 +++ openssh-7.4p1/debian/changelog 2019-07-15 15:32:09.000000000 +0200 @@ -1,3 +1,11 @@ +openssh (1:7.4p1-10+deb9u7) stretch; urgency=medium + + * Fix deadlock when the keys/principals command produces a lot of + output and a key is matched early (upstream commit + ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2). (Closes: #905226) + + -- Moritz Mühlenhoff <j...@debian.org> Mon, 15 Jul 2019 15:32:09 +0200 + openssh (1:7.4p1-10+deb9u6) stretch-security; urgency=high * Non-maintainer upload by the Security Team. diff -Nru openssh-7.4p1/debian/patches/fix-deadlock-in-keys-principals-command.patch openssh-7.4p1/debian/patches/fix-deadlock-in-keys-principals-command.patch --- openssh-7.4p1/debian/patches/fix-deadlock-in-keys-principals-command.patch 1970-01-01 01:00:00.000000000 +0100 +++ openssh-7.4p1/debian/patches/fix-deadlock-in-keys-principals-command.patch 2019-07-15 15:31:41.000000000 +0200 @@ -0,0 +1,37 @@ +From ddd3d34e5c7979ca6f4a3a98a7d219a4ed3d98c2 Mon Sep 17 00:00:00 2001 +From: "d...@openbsd.org" <d...@openbsd.org> +Date: Fri, 30 Dec 2016 22:08:02 +0000 +Subject: [PATCH] upstream commit + +fix deadlock when keys/principals command produces a lot of +output and a key is matched early; bz#2655, patch from jboning AT gmail.com + +Upstream-ID: e19456429bf99087ea994432c16d00a642060afe +--- + auth2-pubkey.c | 8 +++++++- + 1 file changed, 7 insertions(+), 1 deletion(-) + +diff --git a/auth2-pubkey.c b/auth2-pubkey.c +index 20f3309e1..70c021589 100644 +--- a/auth2-pubkey.c ++++ b/auth2-pubkey.c +@@ -727,6 +727,9 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key) + + ok = process_principals(f, NULL, pw, cert); + ++ fclose(f); ++ f = NULL; ++ + if (exited_cleanly(pid, "AuthorizedPrincipalsCommand", command) != 0) + goto out; + +@@ -1050,6 +1053,9 @@ user_key_command_allowed2(struct passwd *user_pw, Key *key) + + ok = check_authkeys_file(f, options.authorized_keys_command, key, pw); + ++ fclose(f); ++ f = NULL; ++ + if (exited_cleanly(pid, "AuthorizedKeysCommand", command) != 0) + goto out; + diff -Nru openssh-7.4p1/debian/patches/series openssh-7.4p1/debian/patches/series --- openssh-7.4p1/debian/patches/series 2019-03-01 17:19:28.000000000 +0100 +++ openssh-7.4p1/debian/patches/series 2019-07-15 15:31:41.000000000 +0200 @@ -44,3 +44,4 @@ have-progressmeter-force-update-at-beginning-and-end-transfer.patch check-filenames-in-scp-client.patch scp-handle-braces.patch +fix-deadlock-in-keys-principals-command.patch