FreeBSD/src 469f61ecrypto/openssh ssh-agent.c sshconnect2.c

ssh: Fix cases where error codes were not correctly set

Obtained from:  OpenSSH 38df39ecf278
Security:       CVE-2025-26465
Security:       FreeBSD-SA-25:05.openssh
Approved by:    so
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit 170059d6d33cf4e890067097f3c0beb3061cabbd)
(cherry picked from commit 4ad8c195cf54411e3b3fa0bec227eb83ca078404)
(cherry picked from commit 8c67967cb14b0ab7e26ffa9ab6cef470a154e030)
DeltaFile
+5-0crypto/openssh/ssh-agent.c
+4-1crypto/openssh/sshconnect2.c
+3-1crypto/openssh/ssh-sk-client.c
+3-1crypto/openssh/krl.c
+1-0crypto/openssh/sshsig.c
+16-35 files

FreeBSD/src 3053f92crypto/openssh ssh-agent.c sshconnect2.c

ssh: Fix cases where error codes were not correctly set

Obtained from:  OpenSSH 38df39ecf278
Security:       CVE-2025-26465
Security:       FreeBSD-SA-25:05.openssh
Approved by:    so
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit 170059d6d33cf4e890067097f3c0beb3061cabbd)
(cherry picked from commit 4ad8c195cf54411e3b3fa0bec227eb83ca078404)
DeltaFile
+5-0crypto/openssh/ssh-agent.c
+4-1crypto/openssh/sshconnect2.c
+3-1crypto/openssh/krl.c
+3-1crypto/openssh/ssh-sk-client.c
+1-0crypto/openssh/sshsig.c
+16-35 files

FreeBSD/src 1920babcrypto/openssh ssh-agent.c sshconnect2.c

ssh: Fix cases where error codes were not correctly set

Obtained from:  OpenSSH 38df39ecf278
Security:       CVE-2025-26465
Security:       FreeBSD-SA-25:05.openssh
Approved by:    so
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit 170059d6d33cf4e890067097f3c0beb3061cabbd)
(cherry picked from commit 4ad8c195cf54411e3b3fa0bec227eb83ca078404)
DeltaFile
+5-0crypto/openssh/ssh-agent.c
+4-1crypto/openssh/sshconnect2.c
+3-1crypto/openssh/krl.c
+3-1crypto/openssh/ssh-sk-client.c
+1-0crypto/openssh/sshsig.c
+16-35 files

FreeBSD/src 88fcdcbcrypto/openssh ssh-agent.c sshconnect2.c

ssh: Fix cases where error codes were not correctly set

Obtained from:  OpenSSH 38df39ecf278
Security:       CVE-2025-26465
Approved by:    so
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit 170059d6d33cf4e890067097f3c0beb3061cabbd)
(cherry picked from commit 4ad8c195cf54411e3b3fa0bec227eb83ca078404)
(cherry picked from commit 8c67967cb14b0ab7e26ffa9ab6cef470a154e030)

Approved by:    re (implicit)
DeltaFile
+5-0crypto/openssh/ssh-agent.c
+4-1crypto/openssh/sshconnect2.c
+3-1crypto/openssh/krl.c
+3-1crypto/openssh/ssh-sk-client.c
+1-0crypto/openssh/sshsig.c
+16-35 files

FreeBSD/src 8c67967crypto/openssh ssh-agent.c sshconnect2.c

ssh: Fix cases where error codes were not correctly set

Obtained from:  OpenSSH 38df39ecf278
Security:       CVE-2025-26465
Approved by:    so
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit 170059d6d33cf4e890067097f3c0beb3061cabbd)
(cherry picked from commit 4ad8c195cf54411e3b3fa0bec227eb83ca078404)
DeltaFile
+5-0crypto/openssh/ssh-agent.c
+4-1crypto/openssh/sshconnect2.c
+3-1crypto/openssh/ssh-sk-client.c
+3-1crypto/openssh/krl.c
+1-0crypto/openssh/sshsig.c
+16-35 files

FreeBSD/src 4ad8c19crypto/openssh ssh-agent.c sshconnect2.c

ssh: Fix cases where error codes were not correctly set

Obtained from:  OpenSSH 38df39ecf278
Security:       CVE-2025-26465
Approved by:    so
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit 170059d6d33cf4e890067097f3c0beb3061cabbd)
DeltaFile
+5-0crypto/openssh/ssh-agent.c
+4-1crypto/openssh/sshconnect2.c
+3-1crypto/openssh/krl.c
+3-1crypto/openssh/ssh-sk-client.c
+1-0crypto/openssh/sshsig.c
+16-35 files

FreeBSD/src 170059dcrypto/openssh ssh-agent.c sshconnect2.c

ssh: Fix cases where error codes were not correctly set

Obtained from:  OpenSSH 38df39ecf278
Security:       CVE-2025-26465
Sponsored by:   The FreeBSD Foundation
DeltaFile
+5-0crypto/openssh/ssh-agent.c
+4-1crypto/openssh/sshconnect2.c
+3-1crypto/openssh/krl.c
+3-1crypto/openssh/ssh-sk-client.c
+1-0crypto/openssh/sshsig.c
+16-35 files

FreeBSD/src b16cb28crypto/openssh ChangeLog servconf.c, crypto/openssh/regress Makefile channel-timeout.sh

ssh: Update to OpenSSH 9.7p1

This release contains mostly bugfixes.

It also makes support for the DSA signature algorithm a compile-time
option, with plans to disable it upstream later this year and remove
support entirely in 2025.

Full release notes at https://www.openssh.com/txt/release-9.7

Relnotes:       Yes
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit a91a246563dffa876a52f53a98de4af9fa364c52)
(cherry picked from commit 464fa66f639bdc8e340dd3f640af4309530d48ca)
DeltaFile
+569-1,774crypto/openssh/ChangeLog
+111-57crypto/openssh/servconf.c
+101-62crypto/openssh/readconf.c
+59-20crypto/openssh/channels.c
+49-28crypto/openssh/regress/Makefile
+72-2crypto/openssh/regress/channel-timeout.sh
+961-1,94368 files not shown
+1,548-2,20874 files

FreeBSD/src 464fa66crypto/openssh ChangeLog servconf.c, crypto/openssh/regress Makefile channel-timeout.sh

ssh: Update to OpenSSH 9.7p1

This release contains mostly bugfixes.

It also makes support for the DSA signature algorithm a compile-time
option, with plans to disable it upstream later this year and remove
support entirely in 2025.

Full release notes at https://www.openssh.com/txt/release-9.7

Relnotes:       Yes
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit a91a246563dffa876a52f53a98de4af9fa364c52)
DeltaFile
+569-1,774crypto/openssh/ChangeLog
+111-57crypto/openssh/servconf.c
+101-62crypto/openssh/readconf.c
+59-20crypto/openssh/channels.c
+49-28crypto/openssh/regress/Makefile
+72-2crypto/openssh/regress/channel-timeout.sh
+961-1,94365 files not shown
+1,544-2,20471 files

FreeBSD/src a91a246crypto/openssh ChangeLog servconf.c, crypto/openssh/regress Makefile channel-timeout.sh

ssh: Update to OpenSSH 9.7p1

This release contains mostly bugfixes.

It also makes support for the DSA signature algorithm a compile-time
option, with plans to disable it upstream later this year and remove
support entirely in 2025.

Full release notes at https://www.openssh.com/txt/release-9.7

Relnotes:       Yes
Sponsored by:   The FreeBSD Foundation
DeltaFile
+569-1,774crypto/openssh/ChangeLog
+111-57crypto/openssh/servconf.c
+101-62crypto/openssh/readconf.c
+59-20crypto/openssh/channels.c
+49-28crypto/openssh/regress/Makefile
+72-2crypto/openssh/regress/channel-timeout.sh
+961-1,94365 files not shown
+1,544-2,20471 files

FreeBSD/src 2cd20d9crypto/openssh ChangeLog moduli, crypto/openssh/regress agent-pkcs11-restrict.sh test-exec.sh

ssh: Update to OpenSSH 9.6p1

From the release notes,

> This release contains a number of security fixes, some small features
> and bugfixes.

The most significant change in 9.6p1 is a set of fixes for a newly-
discovered weakness in the SSH transport protocol.  The fix was already
merged into FreeBSD and released as FreeBSD-SA-23:19.openssh.

Full release notes at https://www.openssh.com/txt/release-9.6

Relnotes:       Yes
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit 069ac18495ad8fde2748bc94b0f80a50250bb01d)
(cherry picked from commit a25789646d7130f5be166cac63d5c8b2b07c4706)
DeltaFile
+855-907crypto/openssh/ChangeLog
+454-444crypto/openssh/moduli
+210-31crypto/openssh/ssh-agent.c
+188-47crypto/openssh/kex.c
+193-0crypto/openssh/regress/agent-pkcs11-restrict.sh
+150-19crypto/openssh/regress/test-exec.sh
+2,050-1,44863 files not shown
+3,216-1,85969 files

FreeBSD/src f26eafdcrypto/openssh ChangeLog moduli, crypto/openssh/openbsd-compat libressl-api-compat.c openssl-compat.h

ssh: Update to OpenSSH 9.4p1

Excerpts from the release notes:

 * ssh-agent(1): PKCS#11 modules must now be specified by their full
   paths. Previously dlopen(3) could search for them in system
   library directories.

 * ssh(1): allow forwarding Unix Domain sockets via ssh -W.

 * ssh(1): add support for configuration tags to ssh(1).
   This adds a ssh_config(5) "Tag" directive and corresponding
   "Match tag" predicate that may be used to select blocks of
   configuration similar to the pf.conf(5) keywords of the same
   name.

 * ssh(1): add a "match localnetwork" predicate. This allows matching
   on the addresses of available network interfaces and may be used to
   vary the effective client configuration based on network location.

    [19 lines not shown]
DeltaFile
+1,353-616crypto/openssh/ChangeLog
+444-424crypto/openssh/moduli
+1-555crypto/openssh/openbsd-compat/libressl-api-compat.c
+297-88crypto/openssh/ssh-pkcs11-client.c
+109-171crypto/openssh/krl.c
+14-144crypto/openssh/openbsd-compat/openssl-compat.h
+2,218-1,99888 files not shown
+3,270-2,61694 files

FreeBSD/src a257896crypto/openssh ChangeLog moduli, crypto/openssh/regress agent-pkcs11-restrict.sh test-exec.sh

ssh: Update to OpenSSH 9.6p1

From the release notes,

> This release contains a number of security fixes, some small features
> and bugfixes.

The most significant change in 9.6p1 is a set of fixes for a newly-
discovered weakness in the SSH transport protocol.  The fix was already
merged into FreeBSD and released as FreeBSD-SA-23:19.openssh.

Full release notes at https://www.openssh.com/txt/release-9.6

Relnotes:       Yes
Sponsored by:   The FreeBSD Foundation

(cherry picked from commit 069ac18495ad8fde2748bc94b0f80a50250bb01d)
DeltaFile
+855-907crypto/openssh/ChangeLog
+454-444crypto/openssh/moduli
+210-31crypto/openssh/ssh-agent.c
+188-47crypto/openssh/kex.c
+193-0crypto/openssh/regress/agent-pkcs11-restrict.sh
+150-19crypto/openssh/regress/test-exec.sh
+2,050-1,44863 files not shown
+3,217-1,86069 files

FreeBSD/src 069ac18crypto/openssh ChangeLog moduli, crypto/openssh/regress agent-pkcs11-restrict.sh test-exec.sh

ssh: Update to OpenSSH 9.6p1

From the release notes,

> This release contains a number of security fixes, some small features
> and bugfixes.

The most significant change in 9.6p1 is a set of fixes for a newly-
discovered weakness in the SSH transport protocol.  The fix was already
merged into FreeBSD and released as FreeBSD-SA-23:19.openssh.

Full release notes at https://www.openssh.com/txt/release-9.6

Relnotes:       Yes
Sponsored by:   The FreeBSD Foundation
DeltaFile
+855-907crypto/openssh/ChangeLog
+454-444crypto/openssh/moduli
+210-31crypto/openssh/ssh-agent.c
+188-47crypto/openssh/kex.c
+193-0crypto/openssh/regress/agent-pkcs11-restrict.sh
+150-19crypto/openssh/regress/test-exec.sh
+2,050-1,44863 files not shown
+3,257-1,86169 files

FreeBSD/src 535af61crypto/openssh ChangeLog moduli, crypto/openssh/openbsd-compat libressl-api-compat.c openssl-compat.h

ssh: Update to OpenSSH 9.4p1

Excerpts from the release notes:

 * ssh-agent(1): PKCS#11 modules must now be specified by their full
   paths. Previously dlopen(3) could search for them in system
   library directories.

 * ssh(1): allow forwarding Unix Domain sockets via ssh -W.

 * ssh(1): add support for configuration tags to ssh(1).
   This adds a ssh_config(5) "Tag" directive and corresponding
   "Match tag" predicate that may be used to select blocks of
   configuration similar to the pf.conf(5) keywords of the same
   name.

 * ssh(1): add a "match localnetwork" predicate. This allows matching
   on the addresses of available network interfaces and may be used to
   vary the effective client configuration based on network location.

    [16 lines not shown]
DeltaFile
+1,353-616crypto/openssh/ChangeLog
+444-424crypto/openssh/moduli
+1-555crypto/openssh/openbsd-compat/libressl-api-compat.c
+297-88crypto/openssh/ssh-pkcs11-client.c
+109-171crypto/openssh/krl.c
+14-144crypto/openssh/openbsd-compat/openssl-compat.h
+2,218-1,99888 files not shown
+3,270-2,61694 files

FreeBSD/src 20bcfc3crypto/openssh ChangeLog ssh-agent.1, crypto/openssh/contrib/suse openssh.spec

ssh: Update to OpenSSH 9.3p2

Approved by:    so
Security:       FreeBSD-SA-23:08.ssh
Security:       CVE-2023-38408
DeltaFile
+33-1,834crypto/openssh/ChangeLog
+20-2crypto/openssh/ssh-agent.1
+20-1crypto/openssh/ssh-agent.c
+2-4crypto/openssh/ssh-pkcs11.c
+2-2crypto/openssh/version.h
+1-1crypto/openssh/contrib/suse/openssh.spec
+78-1,8444 files not shown
+82-1,84810 files

FreeBSD/src 4286578crypto/openssh ssh-agent.1 ssh-agent.c

ssh: Apply CVE-2023-38408 fix from OpenSSH 9.3p2

Approved by:    so
Security:       FreeBSD-SA-23:08.ssh
Security:       CVE-2023-38408
DeltaFile
+43-2crypto/openssh/ssh-agent.1
+24-5crypto/openssh/ssh-agent.c
+2-4crypto/openssh/ssh-pkcs11.c
+1-1crypto/openssh/sshd_config
+1-1crypto/openssh/sshd_config.5
+1-1crypto/openssh/version.h
+72-146 files

FreeBSD/src 56749f0crypto/openssh ssh-agent.1 ssh-agent.c

ssh: disallow loading PKCS#11 modules by default

This is the rest of the OpenSSH 9.3p2 change to address CVE-2023-38408.

From the release notes:

 * ssh-agent(8): the agent will now refuse requests to load PKCS#11
   modules issued by remote clients by default. A flag has been added
   to restore the previous behaviour "-Oallow-remote-pkcs11".

   Note that ssh-agent(8) depends on the SSH client to identify
   requests that are remote. The OpenSSH >=8.9 ssh(1) client does
   this, but forwarding access to an agent socket using other tools
   may circumvent this restriction.

Security:       CVE-2023-38408
Sponsored by:   The FreeBSD Foundation
DeltaFile
+20-2crypto/openssh/ssh-agent.1
+20-1crypto/openssh/ssh-agent.c
+40-32 files

FreeBSD/src 039d7adcrypto/openssh ssh-agent.1 ssh-agent.c

ssh-agent: document "-O no-restrict-websafe"

OpenSSH commits 9fd2441113fc and 4a4883664d6b, which are part of
OpenSSH 9.2p1.

Sponsored by:   The FreeBSD Foundation
DeltaFile
+25-2crypto/openssh/ssh-agent.1
+4-4crypto/openssh/ssh-agent.c
+29-62 files

FreeBSD/src d578a19crypto/openssh ChangeLog ssh-agent.1, crypto/openssh/contrib/redhat openssh.spec

ssh: Update to OpenSSH 9.3p2

From the release notes:

Changes since OpenSSH 9.3
=========================

This release fixes a security bug.

Security
========

Fix CVE-2023-38408 - a condition where specific libaries loaded via
ssh-agent(1)'s PKCS#11 support could be abused to achieve remote
code execution via a forwarded agent socket if the following
conditions are met:

* Exploitation requires the presence of specific libraries on
  the victim system.

    [30 lines not shown]
DeltaFile
+33-1,834crypto/openssh/ChangeLog
+20-2crypto/openssh/ssh-agent.1
+20-1crypto/openssh/ssh-agent.c
+2-4crypto/openssh/ssh-pkcs11.c
+2-2crypto/openssh/version.h
+1-1crypto/openssh/contrib/redhat/openssh.spec
+78-1,8444 files not shown
+82-1,84810 files

FreeBSD/src 66fd12ccrypto/openssh ChangeLog ssh-agent.1

ssh: Update to OpenSSH 9.3p2

From the release notes:

Changes since OpenSSH 9.3
=========================

This release fixes a security bug.

Security
========

Fix CVE-2023-38408 - a condition where specific libaries loaded via
ssh-agent(1)'s PKCS#11 support could be abused to achieve remote
code execution via a forwarded agent socket if the following
conditions are met:

* Exploitation requires the presence of specific libraries on
  the victim system.

    [28 lines not shown]
DeltaFile
+33-1,834crypto/openssh/ChangeLog
+20-2crypto/openssh/ssh-agent.1
+20-1crypto/openssh/ssh-agent.c
+2-4crypto/openssh/ssh-pkcs11.c
+2-2crypto/openssh/version.h
+1-1crypto/openssh/README
+78-1,8444 files not shown
+82-1,84810 files

FreeBSD/src 43ad407crypto/openssh ChangeLog progressmeter.c, crypto/openssh/openbsd-compat bsd-snprintf.c

ssh: Update to OpenSSH 9.3p1

This release fixes a number of security bugs and has minor new
features and bug fixes.  Security fixes, from the release notes
(https://www.openssh.com/txt/release-9.3):

This release contains fixes for a security problem and a memory
safety problem. The memory safety problem is not believed to be
exploitable, but we report most network-reachable memory faults as
security bugs.

 * ssh-add(1): when adding smartcard keys to ssh-agent(1) with the
   per-hop destination constraints (ssh-add -h ...) added in OpenSSH
   8.9, a logic error prevented the constraints from being
   communicated to the agent. This resulted in the keys being added
   without constraints. The common cases of non-smartcard keys and
   keys without destination constraints are unaffected. This problem
   was reported by Luci Stanescu.


    [19 lines not shown]
DeltaFile
+868-826crypto/openssh/ChangeLog
+53-46crypto/openssh/progressmeter.c
+88-5crypto/openssh/sandbox-seccomp-filter.c
+47-45crypto/openssh/sshd.c
+45-45crypto/openssh/openbsd-compat/bsd-snprintf.c
+72-16crypto/openssh/regress/test-exec.sh
+1,173-98395 files not shown
+1,858-1,405101 files

FreeBSD/src 802b483crypto/openssh ChangeLog progressmeter.c, crypto/openssh/openbsd-compat bsd-snprintf.c

ssh: Update to OpenSSH 9.3p1

This release fixes a number of security bugs and has minor new
features and bug fixes.  Security fixes, from the release notes
(https://www.openssh.com/txt/release-9.3):

This release contains fixes for a security problem and a memory
safety problem. The memory safety problem is not believed to be
exploitable, but we report most network-reachable memory faults as
security bugs.

 * ssh-add(1): when adding smartcard keys to ssh-agent(1) with the
   per-hop destination constraints (ssh-add -h ...) added in OpenSSH
   8.9, a logic error prevented the constraints from being
   communicated to the agent. This resulted in the keys being added
   without constraints. The common cases of non-smartcard keys and
   keys without destination constraints are unaffected. This problem
   was reported by Luci Stanescu.


    [19 lines not shown]
DeltaFile
+868-826crypto/openssh/ChangeLog
+53-46crypto/openssh/progressmeter.c
+88-5crypto/openssh/sandbox-seccomp-filter.c
+47-45crypto/openssh/sshd.c
+45-45crypto/openssh/openbsd-compat/bsd-snprintf.c
+72-16crypto/openssh/regress/test-exec.sh
+1,173-98395 files not shown
+1,858-1,405101 files

FreeBSD/src 4d3fc8bcrypto/openssh ChangeLog progressmeter.c, crypto/openssh/openbsd-compat bsd-snprintf.c

ssh: Update to OpenSSH 9.3p1

This release fixes a number of security bugs and has minor new
features and bug fixes.  Security fixes, from the release notes
(https://www.openssh.com/txt/release-9.3):

This release contains fixes for a security problem and a memory
safety problem. The memory safety problem is not believed to be
exploitable, but we report most network-reachable memory faults as
security bugs.

 * ssh-add(1): when adding smartcard keys to ssh-agent(1) with the
   per-hop destination constraints (ssh-add -h ...) added in OpenSSH
   8.9, a logic error prevented the constraints from being
   communicated to the agent. This resulted in the keys being added
   without constraints. The common cases of non-smartcard keys and
   keys without destination constraints are unaffected. This problem
   was reported by Luci Stanescu.


    [15 lines not shown]
DeltaFile
+868-826crypto/openssh/ChangeLog
+53-46crypto/openssh/progressmeter.c
+88-5crypto/openssh/sandbox-seccomp-filter.c
+47-45crypto/openssh/sshd.c
+45-45crypto/openssh/openbsd-compat/bsd-snprintf.c
+72-16crypto/openssh/regress/test-exec.sh
+1,173-98394 files not shown
+1,856-1,403100 files

FreeBSD/src fad31dfcrypto/openssh ChangeLog ed25519.c

ssh: update to OpenSSH 9.2p1

Release notes are available at https://www.openssh.com/txt/release-9.2

OpenSSH 9.2 contains fixes for two security problems and a memory safety
problem.  The memory safety problem is not believed to be exploitable.
These fixes have already been committed to OpenSSH 9.1 in FreeBSD.

Some other notable items from the release notes:

 * ssh(1): add a new EnableEscapeCommandline ssh_config(5) option that
   controls whether the client-side ~C escape sequence that provides a
   command-line is available. Among other things, the ~C command-line
   could be used to add additional port-forwards at runtime.

 * sshd(8): add support for channel inactivity timeouts via a new
   sshd_config(5) ChannelTimeout directive. This allows channels that
   have not seen traffic in a configurable interval to be
   automatically closed. Different timeouts may be applied to session,

    [28 lines not shown]
DeltaFile
+1,806-1,924crypto/openssh/ChangeLog
+1,968-82crypto/openssh/ed25519.c
+407-1,600crypto/openssh/sshkey.c
+653-553crypto/openssh/config.guess
+0-858crypto/openssh/ge25519_base.data
+424-419crypto/openssh/moduli
+5,258-5,436125 files not shown
+9,969-8,102131 files

FreeBSD/src 2f43f14crypto/openssh ChangeLog ed25519.c

ssh: update to OpenSSH 9.2p1

Release notes are available at https://www.openssh.com/txt/release-9.2

OpenSSH 9.2 contains fixes for two security problems and a memory safety
problem.  The memory safety problem is not believed to be exploitable.
These fixes have already been committed to OpenSSH 9.1 in FreeBSD.

Some other notable items from the release notes:

 * ssh(1): add a new EnableEscapeCommandline ssh_config(5) option that
   controls whether the client-side ~C escape sequence that provides a
   command-line is available. Among other things, the ~C command-line
   could be used to add additional port-forwards at runtime.

 * sshd(8): add support for channel inactivity timeouts via a new
   sshd_config(5) ChannelTimeout directive. This allows channels that
   have not seen traffic in a configurable interval to be
   automatically closed. Different timeouts may be applied to session,

    [27 lines not shown]
DeltaFile
+1,806-1,924crypto/openssh/ChangeLog
+1,968-82crypto/openssh/ed25519.c
+407-1,600crypto/openssh/sshkey.c
+653-553crypto/openssh/config.guess
+0-858crypto/openssh/ge25519_base.data
+424-419crypto/openssh/moduli
+5,258-5,436125 files not shown
+9,969-8,102131 files

FreeBSD/src f374ba4crypto/openssh ChangeLog ed25519.c

ssh: update to OpenSSH 9.2p1

Release notes are available at https://www.openssh.com/txt/release-9.2

OpenSSH 9.2 contains fixes for two security problems and a memory safety
problem.  The memory safety problem is not believed to be exploitable.
These fixes have already been committed to OpenSSH 9.1 in FreeBSD.

Some other notable items from the release notes:

 * ssh(1): add a new EnableEscapeCommandline ssh_config(5) option that
   controls whether the client-side ~C escape sequence that provides a
   command-line is available. Among other things, the ~C command-line
   could be used to add additional port-forwards at runtime.

 * sshd(8): add support for channel inactivity timeouts via a new
   sshd_config(5) ChannelTimeout directive. This allows channels that
   have not seen traffic in a configurable interval to be
   automatically closed. Different timeouts may be applied to session,

    [25 lines not shown]
DeltaFile
+1,806-1,924crypto/openssh/ChangeLog
+1,968-82crypto/openssh/ed25519.c
+407-1,600crypto/openssh/sshkey.c
+653-553crypto/openssh/config.guess
+0-858crypto/openssh/ge25519_base.data
+424-419crypto/openssh/moduli
+5,258-5,436125 files not shown
+9,969-8,102131 files

FreeBSD/src 50cb877crypto/openssh ChangeLog moduli, crypto/openssh/openbsd-compat arc4random.c

ssh: update to OpenSSH 9.1p1

Release notes are available at https://www.openssh.com/txt/release-9.1

9.1 contains fixes for three minor memory safety problems; these have
lready been merged to the copy of OpenSSH 9.0 that is in the FreeBSD base
system.

Some highlights copied from the release notes:

Potentially-incompatible changes
--------------------------------

 * ssh(1), sshd(8): SetEnv directives in ssh_config and sshd_config
   are now first-match-wins to match other directives. Previously
   if an environment variable was multiply specified the last set
   value would have been used. bz3438

 * ssh-keygen(8): ssh-keygen -A (generate all default host key types)

    [51 lines not shown]
DeltaFile
+2,035-2,610crypto/openssh/ChangeLog
+419-382crypto/openssh/moduli
+501-0crypto/openssh/auth2-pubkeyfile.c
+39-318crypto/openssh/auth2-pubkey.c
+155-162crypto/openssh/configure.ac
+96-190crypto/openssh/openbsd-compat/arc4random.c
+3,245-3,662123 files not shown
+5,870-4,802129 files

FreeBSD/src 4aee715crypto/openssh ChangeLog moduli, crypto/openssh/openbsd-compat arc4random.c

ssh: update to OpenSSH 9.1p1

Release notes are available at https://www.openssh.com/txt/release-9.1

9.1 contains fixes for three minor memory safety problems; these have
lready been merged to the copy of OpenSSH 9.0 that is in the FreeBSD base
system.

Some highlights copied from the release notes:

Potentially-incompatible changes
--------------------------------

 * ssh(1), sshd(8): SetEnv directives in ssh_config and sshd_config
   are now first-match-wins to match other directives. Previously
   if an environment variable was multiply specified the last set
   value would have been used. bz3438

 * ssh-keygen(8): ssh-keygen -A (generate all default host key types)

    [48 lines not shown]
DeltaFile
+2,035-2,610crypto/openssh/ChangeLog
+419-382crypto/openssh/moduli
+501-0crypto/openssh/auth2-pubkeyfile.c
+39-318crypto/openssh/auth2-pubkey.c
+155-162crypto/openssh/configure.ac
+96-190crypto/openssh/openbsd-compat/arc4random.c
+3,245-3,662123 files not shown
+5,870-4,802129 files

FreeBSD/src 75f9d5ccrypto/openssh ChangeLog moduli, crypto/openssh/openbsd-compat arc4random.c

ssh: update to OpenSSH 9.1p1

Release notes are available at https://www.openssh.com/txt/release-9.1

9.1 contains fixes for three minor memory safety problems; these have
lready been merged to the copy of OpenSSH 9.0 that is in the FreeBSD base
system.

Some highlights copied from the release notes:

Potentially-incompatible changes
--------------------------------

 * ssh(1), sshd(8): SetEnv directives in ssh_config and sshd_config
   are now first-match-wins to match other directives. Previously
   if an environment variable was multiply specified the last set
   value would have been used. bz3438

 * ssh-keygen(8): ssh-keygen -A (generate all default host key types)

    [47 lines not shown]
DeltaFile
+2,035-2,610crypto/openssh/ChangeLog
+419-382crypto/openssh/moduli
+501-0crypto/openssh/auth2-pubkeyfile.c
+39-318crypto/openssh/auth2-pubkey.c
+153-160crypto/openssh/configure.ac
+96-190crypto/openssh/openbsd-compat/arc4random.c
+3,243-3,660124 files not shown
+5,869-4,800130 files