You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This prevents an underflow resulting in a potential out-of-bounds read if a server sends a too-large padding_length, possibly with malicious intent.
32
+
33
+
* Prevent zero-byte allocation in sftp_packet_read() which could lead to an out-of-bounds read. https://libssh2.org/CVE-2019-3858.html
34
+
35
+
* Check the length of data passed to sftp_packet_add() to prevent out-of-bounds reads.
36
+
37
+
* Add a required_size parameter to sftp_packet_require et. al. to require callers of these functions to handle packets that are too short. https://libssh2.org/CVE-2019-3860.html
38
+
39
+
* Additional length checks to prevent out-of-bounds reads and writes in _libssh2_packet_add(). https://libssh2.org/CVE-2019-3862.html
40
+
41
+
GitHub (14 Mar 2019)
42
+
- [Will Cosgrove brought this change]
43
+
44
+
1.8 Security fixes (#314)
45
+
46
+
* fixed possible integer overflow in packet_length
47
+
48
+
CVE https://www.libssh2.org/CVE-2019-3861.html
49
+
50
+
* fixed possible interger overflow with userauth_keyboard_interactive
51
+
52
+
CVE https://www.libssh2.org/CVE-2019-3856.html
53
+
54
+
* fixed possible out zero byte/incorrect bounds allocation
55
+
56
+
CVE https://www.libssh2.org/CVE-2019-3857.html
57
+
58
+
* bounds checks for response packets
59
+
60
+
* fixed integer overflow in userauth_keyboard_interactive
61
+
62
+
CVE https://www.libssh2.org/CVE-2019-3863.html
63
+
64
+
* 1.8.1 release notes
65
+
3
66
Version 1.8.0 (25 Oct 2016)
4
67
5
68
Daniel Stenberg (25 Oct 2016)
@@ -5473,19 +5536,3 @@ Simon Josefsson (16 Nov 2009)
5473
5536
5474
5537
Reported by Steven Van Ingelgem <steven@vaningelgem.be>
5475
5538
in <http://thread.gmane.org/gmane.network.ssh.libssh2.devel/2566>.
5476
-
5477
-
- Mention libssh2-style.el.
5478
-
5479
-
- Use memmove instead of memcpy on overlapping memory areas.
5480
-
5481
-
Reported by Bob Alexander <balexander@expressor-software.com> in
0 commit comments