summaryrefslogtreecommitdiff
path: root/libs/libssh2/docs
diff options
context:
space:
mode:
authordartraiden <wowemuh@gmail.com>2019-03-27 03:01:55 +0300
committerdartraiden <wowemuh@gmail.com>2019-03-27 16:05:08 +0300
commitd8f8bd7643efcc9b96e15143cb60953f1d4382b2 (patch)
treebed20cf2916be0ae0dd0be7e0b7a7a04124b0570 /libs/libssh2/docs
parenteeb7f248a5228964f416610bef81397e424adc52 (diff)
iibssh2: update to 1.8.2
Diffstat (limited to 'libs/libssh2/docs')
-rw-r--r--libs/libssh2/docs/NEWS79
-rw-r--r--libs/libssh2/docs/RELEASE-NOTES29
2 files changed, 69 insertions, 39 deletions
diff --git a/libs/libssh2/docs/NEWS b/libs/libssh2/docs/NEWS
index e3caaece5e..a9c0a3f1ba 100644
--- a/libs/libssh2/docs/NEWS
+++ b/libs/libssh2/docs/NEWS
@@ -1,5 +1,68 @@
Changelog for the libssh2 project. Generated with git2news.pl
+Version 1.8.2 (25 Mar 2019)
+
+Daniel Stenberg (25 Mar 2019)
+- RELEASE-NOTES: version 1.8.2
+
+- [Will Cosgrove brought this change]
+
+ moved MAX size declarations #330
+
+- [Will Cosgrove brought this change]
+
+ Fixed misapplied patch (#327)
+
+ Fixes for user auth
+
+Version 1.8.1 (14 Mar 2019)
+
+Will Cosgrove (14 Mar 2019)
+- [Michael Buckley brought this change]
+
+ More 1.8.0 security fixes (#316)
+
+ * Defend against possible integer overflows in comp_method_zlib_decomp.
+
+ * Defend against writing beyond the end of the payload in _libssh2_transport_read().
+
+ * Sanitize padding_length - _libssh2_transport_read(). https://libssh2.org/CVE-2019-3861.html
+
+ This prevents an underflow resulting in a potential out-of-bounds read if a server sends a too-large padding_length, possibly with malicious intent.
+
+ * Prevent zero-byte allocation in sftp_packet_read() which could lead to an out-of-bounds read. https://libssh2.org/CVE-2019-3858.html
+
+ * Check the length of data passed to sftp_packet_add() to prevent out-of-bounds reads.
+
+ * Add a required_size parameter to sftp_packet_require et. al. to require callers of these functions to handle packets that are too short. https://libssh2.org/CVE-2019-3860.html
+
+ * Additional length checks to prevent out-of-bounds reads and writes in _libssh2_packet_add(). https://libssh2.org/CVE-2019-3862.html
+
+GitHub (14 Mar 2019)
+- [Will Cosgrove brought this change]
+
+ 1.8 Security fixes (#314)
+
+ * fixed possible integer overflow in packet_length
+
+ CVE https://www.libssh2.org/CVE-2019-3861.html
+
+ * fixed possible interger overflow with userauth_keyboard_interactive
+
+ CVE https://www.libssh2.org/CVE-2019-3856.html
+
+ * fixed possible out zero byte/incorrect bounds allocation
+
+ CVE https://www.libssh2.org/CVE-2019-3857.html
+
+ * bounds checks for response packets
+
+ * fixed integer overflow in userauth_keyboard_interactive
+
+ CVE https://www.libssh2.org/CVE-2019-3863.html
+
+ * 1.8.1 release notes
+
Version 1.8.0 (25 Oct 2016)
Daniel Stenberg (25 Oct 2016)
@@ -5473,19 +5536,3 @@ Simon Josefsson (16 Nov 2009)
Reported by Steven Van Ingelgem <steven@vaningelgem.be>
in <http://thread.gmane.org/gmane.network.ssh.libssh2.devel/2566>.
-
-- Mention libssh2-style.el.
-
-- Use memmove instead of memcpy on overlapping memory areas.
-
- Reported by Bob Alexander <balexander@expressor-software.com> in
- <http://thread.gmane.org/gmane.network.ssh.libssh2.devel/2530>.
-
-- Add.
-
-- Protect against crash on too small SSH_MSG_IGNORE packets.
-
- Reported by Bob Alexander <balexander@expressor-software.com>
- in <http://thread.gmane.org/gmane.network.ssh.libssh2.devel/2530>.
-
-- add copyright line
diff --git a/libs/libssh2/docs/RELEASE-NOTES b/libs/libssh2/docs/RELEASE-NOTES
index 6c2d7de324..d566bafe01 100644
--- a/libs/libssh2/docs/RELEASE-NOTES
+++ b/libs/libssh2/docs/RELEASE-NOTES
@@ -1,29 +1,12 @@
-libssh2 1.8.1
+libssh2 1.8.2
This release includes the following bugfixes:
-
- o fixed possible integer overflow when reading a specially crafted packet
- (https://www.libssh2.org/CVE-2019-3855.html)
- o fixed possible integer overflow in userauth_keyboard_interactive with a
- number of extremely long prompt strings
- (https://www.libssh2.org/CVE-2019-3863.html)
- o fixed possible integer overflow if the server sent an extremely large number
- of keyboard prompts (https://www.libssh2.org/CVE-2019-3856.html)
- o fixed possible out of bounds read when processing a specially crafted packet
- (https://www.libssh2.org/CVE-2019-3861.html)
- o fixed possible integer overflow when receiving a specially crafted exit
- signal message channel packet (https://www.libssh2.org/CVE-2019-3857.html)
- o fixed possible out of bounds read when receiving a specially crafted exit
- status message channel packet (https://www.libssh2.org/CVE-2019-3862.html)
- o fixed possible zero byte allocation when reading a specially crafted SFTP
- packet (https://www.libssh2.org/CVE-2019-3858.html)
- o fixed possible out of bounds reads when processing specially crafted SFTP
- packets (https://www.libssh2.org/CVE-2019-3860.html)
- o fixed possible out of bounds reads in _libssh2_packet_require(v)
- (https://www.libssh2.org/CVE-2019-3859.html)
+
+ o Fixed the misapplied userauth patch that broke 1.8.1
+ o moved the MAX size declarations from the public header
This release would not have looked like this without help, code, reports and
advice from friends like these:
- Chris Coulson, Michael Buckley, Will Cosgrove, Daniel Stenberg
- (4 contributors)
+ Will Cosgrove
+ (1 contributors)