SECURITY update to libssh 0.5.3
More info at http://www.libssh.org/2012/11/20/libssh-0-5-3-security-release/ - CVE-2012-4559: multiple double free() flaws - CVE-2012-4560: multiple buffer overflow flaws - CVE-2012-4561: multiple invalid free() flaws - CVE-2012-4562: multiple improper overflow checks ok rpointel@ jasper@
This commit is contained in:
parent
12a2d09d56
commit
e5bef61946
@ -1,8 +1,8 @@
|
||||
# $OpenBSD: Makefile,v 1.4 2012/05/20 17:04:55 ajacoutot Exp $
|
||||
# $OpenBSD: Makefile,v 1.5 2012/11/22 20:54:11 sthen Exp $
|
||||
|
||||
COMMENT = C library implementing server and client side
|
||||
DISTNAME = libssh-0.5.2
|
||||
REVISION = 0
|
||||
# XXX if updating, check the number in the MASTER_SITES path
|
||||
DISTNAME = libssh-0.5.3
|
||||
|
||||
SHARED_LIBS += ssh 0.0 # 4.2
|
||||
SHARED_LIBS += ssh_threads 0.0 # 4.2
|
||||
@ -10,7 +10,7 @@ SHARED_LIBS += ssh_threads 0.0 # 4.2
|
||||
CATEGORIES = security devel
|
||||
|
||||
HOMEPAGE = http://www.libssh.org/
|
||||
MASTER_SITES = ${HOMEPAGE}files/0.5/
|
||||
MASTER_SITES = https://red.libssh.org/attachments/download/38/
|
||||
|
||||
MAINTAINER = Remi Pointel <rpointel@openbsd.org>
|
||||
|
||||
|
@ -1,5 +1,2 @@
|
||||
MD5 (libssh-0.5.2.tar.gz) = OLZ8SK96kgRmCj4I+Xzrpg==
|
||||
RMD160 (libssh-0.5.2.tar.gz) = fhNSMp3AshJJUSLVc3yoIdQPMP4=
|
||||
SHA1 (libssh-0.5.2.tar.gz) = S/NtQFK9DJSOBbvzsM0NqGhKwA4=
|
||||
SHA256 (libssh-0.5.2.tar.gz) = Qei5wa8HdURiXos5hYLxAdrMO4RX/uGBGnJMpCRasic=
|
||||
SIZE (libssh-0.5.2.tar.gz) = 317336
|
||||
SHA256 (libssh-0.5.3.tar.gz) = 7UKmyUx0uv7VgMrq9Ar4PsQJqqG4MBDLHhxguU8Q2vA=
|
||||
SIZE (libssh-0.5.3.tar.gz) = 369344
|
||||
|
@ -1,10 +1,7 @@
|
||||
$OpenBSD: patch-src_channels_c,v 1.2 2012/06/26 14:45:04 jasper Exp $
|
||||
|
||||
https://red.libssh.org/issues/86
|
||||
|
||||
--- src/channels.c.orig Fri Sep 16 21:57:36 2011
|
||||
+++ src/channels.c Sun May 20 14:44:32 2012
|
||||
@@ -678,21 +679,21 @@ SSH_PACKET_CALLBACK(channel_rcv_request) {
|
||||
$OpenBSD: patch-src_channels_c,v 1.3 2012/11/22 20:54:12 sthen Exp $
|
||||
--- src/channels.c.orig Tue Nov 20 11:42:02 2012
|
||||
+++ src/channels.c Thu Nov 22 11:29:05 2012
|
||||
@@ -679,21 +679,21 @@ SSH_PACKET_CALLBACK(channel_rcv_request) {
|
||||
}
|
||||
|
||||
if (strcmp(request,"signal") == 0) {
|
||||
|
Loading…
x
Reference in New Issue
Block a user