SECURITY update to libssh 0.5.3

More info at http://www.libssh.org/2012/11/20/libssh-0-5-3-security-release/

- CVE-2012-4559: multiple double free() flaws
- CVE-2012-4560: multiple buffer overflow flaws
- CVE-2012-4561: multiple invalid free() flaws
- CVE-2012-4562: multiple improper overflow checks

ok rpointel@ jasper@
This commit is contained in:
sthen 2012-11-22 20:54:11 +00:00
parent 12a2d09d56
commit e5bef61946
3 changed files with 10 additions and 16 deletions

View File

@ -1,8 +1,8 @@
# $OpenBSD: Makefile,v 1.4 2012/05/20 17:04:55 ajacoutot Exp $
# $OpenBSD: Makefile,v 1.5 2012/11/22 20:54:11 sthen Exp $
COMMENT = C library implementing server and client side
DISTNAME = libssh-0.5.2
REVISION = 0
# XXX if updating, check the number in the MASTER_SITES path
DISTNAME = libssh-0.5.3
SHARED_LIBS += ssh 0.0 # 4.2
SHARED_LIBS += ssh_threads 0.0 # 4.2
@ -10,7 +10,7 @@ SHARED_LIBS += ssh_threads 0.0 # 4.2
CATEGORIES = security devel
HOMEPAGE = http://www.libssh.org/
MASTER_SITES = ${HOMEPAGE}files/0.5/
MASTER_SITES = https://red.libssh.org/attachments/download/38/
MAINTAINER = Remi Pointel <rpointel@openbsd.org>

View File

@ -1,5 +1,2 @@
MD5 (libssh-0.5.2.tar.gz) = OLZ8SK96kgRmCj4I+Xzrpg==
RMD160 (libssh-0.5.2.tar.gz) = fhNSMp3AshJJUSLVc3yoIdQPMP4=
SHA1 (libssh-0.5.2.tar.gz) = S/NtQFK9DJSOBbvzsM0NqGhKwA4=
SHA256 (libssh-0.5.2.tar.gz) = Qei5wa8HdURiXos5hYLxAdrMO4RX/uGBGnJMpCRasic=
SIZE (libssh-0.5.2.tar.gz) = 317336
SHA256 (libssh-0.5.3.tar.gz) = 7UKmyUx0uv7VgMrq9Ar4PsQJqqG4MBDLHhxguU8Q2vA=
SIZE (libssh-0.5.3.tar.gz) = 369344

View File

@ -1,10 +1,7 @@
$OpenBSD: patch-src_channels_c,v 1.2 2012/06/26 14:45:04 jasper Exp $
https://red.libssh.org/issues/86
--- src/channels.c.orig Fri Sep 16 21:57:36 2011
+++ src/channels.c Sun May 20 14:44:32 2012
@@ -678,21 +679,21 @@ SSH_PACKET_CALLBACK(channel_rcv_request) {
$OpenBSD: patch-src_channels_c,v 1.3 2012/11/22 20:54:12 sthen Exp $
--- src/channels.c.orig Tue Nov 20 11:42:02 2012
+++ src/channels.c Thu Nov 22 11:29:05 2012
@@ -679,21 +679,21 @@ SSH_PACKET_CALLBACK(channel_rcv_request) {
}
if (strcmp(request,"signal") == 0) {