Bug 236711 - security/libssh2: update to 1.8.1
Summary: security/libssh2: update to 1.8.1
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Many People
Assignee: Steve Wills
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2019-03-22 08:52 UTC by Leonid Nevecherya
Modified: 2019-04-24 16:55 UTC (History)
1 user (show)

See Also:
sbz: maintainer-feedback+
swills: merge-quarterly+


Attachments
update to 1.8.1 (838 bytes, patch)
2019-03-22 08:52 UTC, Leonid Nevecherya
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Leonid Nevecherya 2019-03-22 08:52:50 UTC
Created attachment 203042 [details]
update to 1.8.1

- Update to 1.8.1
 
Bug fixes:

    fixed possible integer overflow when reading a specially crafted packet
    fixed possible integer overflow in userauth_keyboard_interactive with a number of extremely long prompt strings
    fixed possible integer overflow if the server sent an extremely large number of keyboard prompts
    fixed possible out of bounds read when processing a specially crafted packet
    fixed possible integer overflow when receiving a specially crafted exit signal message channel packet
    fixed possible out of bounds read when receiving a specially crafted exit status message channel packet
    fixed possible zero byte allocation when reading a specially crafted SFTP packet
    fixed possible out of bounds reads when processing specially crafted SFTP packets
    fixed possible out of bounds reads in _libssh2_packet_require(v)
Comment 1 Sofian Brabez freebsd_committer freebsd_triage 2019-04-17 19:54:05 UTC
Approved and handover to swills@ by private email. It will handle this PR because at the moment I don't have shell access. Thanks!
Comment 2 commit-hook freebsd_committer freebsd_triage 2019-04-18 10:37:17 UTC
A commit references this bug:

Author: swills
Date: Thu Apr 18 10:37:13 UTC 2019
New revision: 499246
URL: https://svnweb.freebsd.org/changeset/ports/499246

Log:
  security/libssh2: update to 1.8.1

  PR:		236711
  Submitted by:	Leonid Nevecherya <nevecherya@gmail.com>
  Approved by:	sbz (maintainer)
  MFH:		2019Q2
  Security:	6e58e1e9-2636-413e-9f84-4c0e21143628

Changes:
  head/security/libssh2/Makefile
  head/security/libssh2/distinfo
Comment 3 commit-hook freebsd_committer freebsd_triage 2019-04-18 10:38:20 UTC
A commit references this bug:

Author: swills
Date: Thu Apr 18 10:38:11 UTC 2019
New revision: 499247
URL: https://svnweb.freebsd.org/changeset/ports/499247

Log:
  MFH: r499246

  security/libssh2: update to 1.8.1

  PR:		236711
  Submitted by:	Leonid Nevecherya <nevecherya@gmail.com>
  Approved by:	sbz (maintainer)
  Security:	6e58e1e9-2636-413e-9f84-4c0e21143628
  Approved by:	ports-secteam (implicit)

Changes:
_U  branches/2019Q2/
  branches/2019Q2/security/libssh2/Makefile
  branches/2019Q2/security/libssh2/distinfo
Comment 4 Steve Wills freebsd_committer freebsd_triage 2019-04-18 10:39:36 UTC
Committed, thanks!
Comment 5 Leonid Nevecherya 2019-04-20 19:44:29 UTC
Previous port versions weren't marked as vulnerable!
Comment 6 Leonid Nevecherya 2019-04-24 08:47:13 UTC
You added entry in VuXML
...
    <affects>
      <package>
        <name>libssh2</name>
        <range><lt>1.8.1</lt></range>
      </package>
    </affects>
...
But needs
...
    <affects>
      <package>
        <name>libssh2</name>
        <range><lt>1.8.1,3</lt></range>
      </package>
    </affects>
...
Otherwise previous port versions aren't marked as vulnerable.
Comment 7 Steve Wills freebsd_committer freebsd_triage 2019-04-24 16:55:43 UTC
(In reply to Leonid Nevecherya from comment #6)
Ah, done in ports r499864. Thanks for the pointer, sorry I missed that.