Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 22 Mar 2019 08:52:50 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 236711] security/libssh2: update to 1.8.1
Message-ID:  <bug-236711-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D236711

            Bug ID: 236711
           Summary: security/libssh2: update to 1.8.1
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: sbz@FreeBSD.org
          Reporter: nevecherya@gmail.com
          Assignee: sbz@FreeBSD.org
             Flags: maintainer-feedback?(sbz@FreeBSD.org)

Created attachment 203042
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D203042&action=
=3Dedit
update to 1.8.1

- Update to 1.8.1

Bug fixes:

    fixed possible integer overflow when reading a specially crafted packet
    fixed possible integer overflow in userauth_keyboard_interactive with a
number of extremely long prompt strings
    fixed possible integer overflow if the server sent an extremely large
number of keyboard prompts
    fixed possible out of bounds read when processing a specially crafted
packet
    fixed possible integer overflow when receiving a specially crafted exit
signal message channel packet
    fixed possible out of bounds read when receiving a specially crafted ex=
it
status message channel packet
    fixed possible zero byte allocation when reading a specially crafted SF=
TP
packet
    fixed possible out of bounds reads when processing specially crafted SF=
TP
packets
    fixed possible out of bounds reads in _libssh2_packet_require(v)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-236711-7788>