diff options
author | dartraiden <wowemuh@gmail.com> | 2019-03-27 03:01:55 +0300 |
---|---|---|
committer | dartraiden <wowemuh@gmail.com> | 2019-03-27 16:05:08 +0300 |
commit | d8f8bd7643efcc9b96e15143cb60953f1d4382b2 (patch) | |
tree | bed20cf2916be0ae0dd0be7e0b7a7a04124b0570 /libs/libssh2/docs/RELEASE-NOTES | |
parent | eeb7f248a5228964f416610bef81397e424adc52 (diff) |
iibssh2: update to 1.8.2
Diffstat (limited to 'libs/libssh2/docs/RELEASE-NOTES')
-rw-r--r-- | libs/libssh2/docs/RELEASE-NOTES | 29 |
1 files changed, 6 insertions, 23 deletions
diff --git a/libs/libssh2/docs/RELEASE-NOTES b/libs/libssh2/docs/RELEASE-NOTES index 6c2d7de324..d566bafe01 100644 --- a/libs/libssh2/docs/RELEASE-NOTES +++ b/libs/libssh2/docs/RELEASE-NOTES @@ -1,29 +1,12 @@ -libssh2 1.8.1 +libssh2 1.8.2 This release includes the following bugfixes: - - o fixed possible integer overflow when reading a specially crafted packet - (https://www.libssh2.org/CVE-2019-3855.html) - o fixed possible integer overflow in userauth_keyboard_interactive with a - number of extremely long prompt strings - (https://www.libssh2.org/CVE-2019-3863.html) - o fixed possible integer overflow if the server sent an extremely large number - of keyboard prompts (https://www.libssh2.org/CVE-2019-3856.html) - o fixed possible out of bounds read when processing a specially crafted packet - (https://www.libssh2.org/CVE-2019-3861.html) - o fixed possible integer overflow when receiving a specially crafted exit - signal message channel packet (https://www.libssh2.org/CVE-2019-3857.html) - o fixed possible out of bounds read when receiving a specially crafted exit - status message channel packet (https://www.libssh2.org/CVE-2019-3862.html) - o fixed possible zero byte allocation when reading a specially crafted SFTP - packet (https://www.libssh2.org/CVE-2019-3858.html) - o fixed possible out of bounds reads when processing specially crafted SFTP - packets (https://www.libssh2.org/CVE-2019-3860.html) - o fixed possible out of bounds reads in _libssh2_packet_require(v) - (https://www.libssh2.org/CVE-2019-3859.html) + + o Fixed the misapplied userauth patch that broke 1.8.1 + o moved the MAX size declarations from the public header This release would not have looked like this without help, code, reports and advice from friends like these: - Chris Coulson, Michael Buckley, Will Cosgrove, Daniel Stenberg - (4 contributors) + Will Cosgrove + (1 contributors) |