summaryrefslogtreecommitdiff
path: root/libs/libssh2/docs/RELEASE-NOTES
diff options
context:
space:
mode:
authordartraiden <wowemuh@gmail.com>2019-03-27 03:01:55 +0300
committerdartraiden <wowemuh@gmail.com>2019-03-27 16:05:08 +0300
commitd8f8bd7643efcc9b96e15143cb60953f1d4382b2 (patch)
treebed20cf2916be0ae0dd0be7e0b7a7a04124b0570 /libs/libssh2/docs/RELEASE-NOTES
parenteeb7f248a5228964f416610bef81397e424adc52 (diff)
iibssh2: update to 1.8.2
Diffstat (limited to 'libs/libssh2/docs/RELEASE-NOTES')
-rw-r--r--libs/libssh2/docs/RELEASE-NOTES29
1 files changed, 6 insertions, 23 deletions
diff --git a/libs/libssh2/docs/RELEASE-NOTES b/libs/libssh2/docs/RELEASE-NOTES
index 6c2d7de324..d566bafe01 100644
--- a/libs/libssh2/docs/RELEASE-NOTES
+++ b/libs/libssh2/docs/RELEASE-NOTES
@@ -1,29 +1,12 @@
-libssh2 1.8.1
+libssh2 1.8.2
This release includes the following bugfixes:
-
- o fixed possible integer overflow when reading a specially crafted packet
- (https://www.libssh2.org/CVE-2019-3855.html)
- o fixed possible integer overflow in userauth_keyboard_interactive with a
- number of extremely long prompt strings
- (https://www.libssh2.org/CVE-2019-3863.html)
- o fixed possible integer overflow if the server sent an extremely large number
- of keyboard prompts (https://www.libssh2.org/CVE-2019-3856.html)
- o fixed possible out of bounds read when processing a specially crafted packet
- (https://www.libssh2.org/CVE-2019-3861.html)
- o fixed possible integer overflow when receiving a specially crafted exit
- signal message channel packet (https://www.libssh2.org/CVE-2019-3857.html)
- o fixed possible out of bounds read when receiving a specially crafted exit
- status message channel packet (https://www.libssh2.org/CVE-2019-3862.html)
- o fixed possible zero byte allocation when reading a specially crafted SFTP
- packet (https://www.libssh2.org/CVE-2019-3858.html)
- o fixed possible out of bounds reads when processing specially crafted SFTP
- packets (https://www.libssh2.org/CVE-2019-3860.html)
- o fixed possible out of bounds reads in _libssh2_packet_require(v)
- (https://www.libssh2.org/CVE-2019-3859.html)
+
+ o Fixed the misapplied userauth patch that broke 1.8.1
+ o moved the MAX size declarations from the public header
This release would not have looked like this without help, code, reports and
advice from friends like these:
- Chris Coulson, Michael Buckley, Will Cosgrove, Daniel Stenberg
- (4 contributors)
+ Will Cosgrove
+ (1 contributors)