package/libssh2: security bump to version 1.9.0
authorFabrice Fontaine <fontaine.fabrice@gmail.com>
Sat, 17 Aug 2019 19:30:50 +0000 (21:30 +0200)
committerThomas Petazzoni <thomas.petazzoni@bootlin.com>
Sat, 17 Aug 2019 22:16:03 +0000 (00:16 +0200)
commitdea6f1f3038a8637add0e0ec576d1bafe7914e45
tree7adaa10ab9d8e1f8aa07e4dd60eac28ffccf6758
parentac9c865a10f47fcc311f2badb1abe9cf279def57
package/libssh2: security bump to version 1.9.0

Fix CVE-2019-13115: In libssh2 before 1.9.0,
kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c
has an integer overflow that could lead to an out-of-bounds read in the
way packets are read from the server. A remote attacker who compromises
a SSH server may be able to disclose sensitive information or cause a
denial of service condition on the client system when a user connects to
the server. This is related to an _libssh2_check_length mistake, and is
different from the various issues fixed in 1.8.1, such as CVE-2019-3855.

Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
package/libssh2/libssh2.hash
package/libssh2/libssh2.mk