pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/security/libssh



Module Name:    pkgsrc
Committed By:   bsiegert
Date:           Tue Mar 17 19:33:34 UTC 2026

Modified Files:
        pkgsrc/security/libssh: Makefile PLIST distinfo
        pkgsrc/security/libssh/patches: patch-tests_CMakeLists.txt
Removed Files:
        pkgsrc/security/libssh/patches: patch-src_misc.c
            patch-tests_client_torture__session.c
            patch-tests_unittests_torture__misc.c

Log Message:
libssh: update to 0.11.4

This is a stable release in the 0.11 series. There is also 0.12.0
available, but this has less potential for breakage, I assume.

version 0.11.4 (released 2026-02-10)
 * Security:
   * CVE-2025-14821: libssh loads configuration files from the C:\etc directory
     on Windows
   * CVE-2026-0964: SCP Protocol Path Traversal in ssh_scp_pull_request()
   * CVE-2026-0965: Possible Denial of Service when parsing unexpected
     configuration files
   * CVE-2026-0966: Buffer underflow in ssh_get_hexa() on invalid input
   * CVE-2026-0967: Specially crafted patterns could cause DoS
   * CVE-2026-0968: OOB Read in sftp_parse_longname()
   * libssh-2026-sftp-extensions: Read buffer overrun when handling SFTP
     extensions
 * Stability and compatibility improvements of ProxyJump

version 0.11.3 (released 2025-09-09)
 * Security:
   * CVE-2025-8114: Fix NULL pointer dereference after allocation failure
   * CVE-2025-8277: Fix memory leak of ephemeral key pair during repeated wrong KEX
   * Potential UAF when send() fails during key exchange
 * Fix possible timeout during KEX if client sends authentication too early (#311)
 * Cleanup OpenSSL PKCS#11 provider when loaded
 * Zeroize buffers containing private key blobs during export

version 0.11.2 (released 2025-06-24)
 * Security:
   * CVE-2025-4877 - Write beyond bounds in binary to base64 conversion
   * CVE-2025-4878 - Use of uninitialized variable in privatekey_from_file()
   * CVE-2025-5318 - Likely read beyond bounds in sftp server handle management
   * CVE-2025-5351 - Double free in functions exporting keys
   * CVE-2025-5372 - ssh_kdf() returns a success code on certain failures
   * CVE-2025-5449 - Likely read beyond bounds in sftp server message decoding
   * CVE-2025-5987 - Invalid return code for chacha20 poly1305 with OpenSSL
 * Compatibility
   * Fixed compatibility with CPM.cmake
   * Compatibility with OpenSSH 10.0
   * Tests compatibility with new Dropbear releases
   * Removed p11-kit remoting from the pkcs11 testsuite
 * Bugfixes
   * Implement missing packet filter for DH GEX
   * Properly process the SSH2_MSG_DEBUG message
   * Allow escaping quotes in quoted arguments to ssh configuration
   * Do not fail with unknown match keywords in ssh configuration
   * Process packets before selecting signature algorithm during authentication
   * Do not fail hard when the SFTP status message is not sent by noncompliant
     servers


To generate a diff of this commit:
cvs rdiff -u -r1.55 -r1.56 pkgsrc/security/libssh/Makefile
cvs rdiff -u -r1.22 -r1.23 pkgsrc/security/libssh/PLIST
cvs rdiff -u -r1.34 -r1.35 pkgsrc/security/libssh/distinfo
cvs rdiff -u -r1.1 -r0 pkgsrc/security/libssh/patches/patch-src_misc.c \
    pkgsrc/security/libssh/patches/patch-tests_client_torture__session.c \
    pkgsrc/security/libssh/patches/patch-tests_unittests_torture__misc.c
cvs rdiff -u -r1.2 -r1.3 \
    pkgsrc/security/libssh/patches/patch-tests_CMakeLists.txt

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/security/libssh/Makefile
diff -u pkgsrc/security/libssh/Makefile:1.55 pkgsrc/security/libssh/Makefile:1.56
--- pkgsrc/security/libssh/Makefile:1.55        Mon Sep 29 21:24:22 2025
+++ pkgsrc/security/libssh/Makefile     Tue Mar 17 19:33:33 2026
@@ -1,12 +1,11 @@
-# $NetBSD: Makefile,v 1.55 2025/09/29 21:24:22 nia Exp $
+# $NetBSD: Makefile,v 1.56 2026/03/17 19:33:33 bsiegert Exp $
 #
 # history: upstream renamed 0.11 to 0.1.1;
 # we have to use the old-style convention so that version compares work.
 
-VER=           0.11.1
+VER=           0.11.4
 DISTNAME=      libssh-${VER}
-PKGNAME=       libssh-0.111
-PKGREVISION=   2
+PKGNAME=       libssh-0.114
 CATEGORIES=    security
 MASTER_SITES=  https://www.libssh.org/files/${VER:R}/
 EXTRACT_SUFX=  .tar.xz

Index: pkgsrc/security/libssh/PLIST
diff -u pkgsrc/security/libssh/PLIST:1.22 pkgsrc/security/libssh/PLIST:1.23
--- pkgsrc/security/libssh/PLIST:1.22   Fri Dec 27 11:15:39 2024
+++ pkgsrc/security/libssh/PLIST        Tue Mar 17 19:33:33 2026
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.22 2024/12/27 11:15:39 adam Exp $
+@comment $NetBSD: PLIST,v 1.23 2026/03/17 19:33:33 bsiegert Exp $
 include/libssh/callbacks.h
 include/libssh/legacy.h
 include/libssh/libssh.h
@@ -13,5 +13,5 @@ lib/cmake/libssh/libssh-config-version.c
 lib/cmake/libssh/libssh-config.cmake
 lib/libssh.so
 lib/libssh.so.4
-lib/libssh.so.4.10.1
+lib/libssh.so.4.10.4
 lib/pkgconfig/libssh.pc

Index: pkgsrc/security/libssh/distinfo
diff -u pkgsrc/security/libssh/distinfo:1.34 pkgsrc/security/libssh/distinfo:1.35
--- pkgsrc/security/libssh/distinfo:1.34        Thu May  1 18:19:22 2025
+++ pkgsrc/security/libssh/distinfo     Tue Mar 17 19:33:33 2026
@@ -1,12 +1,9 @@
-$NetBSD: distinfo,v 1.34 2025/05/01 18:19:22 tnn Exp $
+$NetBSD: distinfo,v 1.35 2026/03/17 19:33:33 bsiegert Exp $
 
-BLAKE2s (libssh-0.11.1.tar.xz) = 097094811bc8708196c48f9b237d2da6ebd5d3b48cf19d0d6f69e8cec83a5cd9
-SHA512 (libssh-0.11.1.tar.xz) = 284d376ad9ea30b0274b4ac754b27d168286dca862ece43ef15ca6d89e66865ad7a6703cc12dd4a8564a60b8449ae9b36e6496fd51d34cc27ac4030f6cf216d6
-Size (libssh-0.11.1.tar.xz) = 621108 bytes
+BLAKE2s (libssh-0.11.4.tar.xz) = d25e69defcccff547fac66700f8fd30d1af90c2a65a4be19d2be4ffad3ddba56
+SHA512 (libssh-0.11.4.tar.xz) = 00c7e1317dcca8feab07eb3d6feb7bbc74c563149173d439d618f431386c4ca1d6f258567ef0599f08275a3a165c04105568f55e6ed7f0fe1a88382e2ebdc850
+Size (libssh-0.11.4.tar.xz) = 626652 bytes
 SHA1 (patch-CompilerChecks.cmake) = 8a650be5b69e956a0a54f54b71c4927ce685b8ca
 SHA1 (patch-examples_sshd__direct-tcpip.c) = 62de8625d58dbc03c38b0eb23f6e7f20a46e91de
-SHA1 (patch-src_misc.c) = f022c1a888ef1d9a7f1963981a989a82c41afcb3
-SHA1 (patch-tests_CMakeLists.txt) = 42728a0af04fababbbe973c3408ea31038b59276
-SHA1 (patch-tests_client_torture__session.c) = d3c67c2e17afb8e980486815b1debb6c8d9eb060
+SHA1 (patch-tests_CMakeLists.txt) = b5baa8db2161d3f1c7aab317b2919de5dbca6e6a
 SHA1 (patch-tests_torture.c) = 2c70e9d827f15ec36a62e0d0f5dd98774f24f79e
-SHA1 (patch-tests_unittests_torture__misc.c) = aba0eb9f590a5c91152dc026fcba714acef823be

Index: pkgsrc/security/libssh/patches/patch-tests_CMakeLists.txt
diff -u pkgsrc/security/libssh/patches/patch-tests_CMakeLists.txt:1.2 pkgsrc/security/libssh/patches/patch-tests_CMakeLists.txt:1.3
--- pkgsrc/security/libssh/patches/patch-tests_CMakeLists.txt:1.2       Thu May  1 18:19:22 2025
+++ pkgsrc/security/libssh/patches/patch-tests_CMakeLists.txt   Tue Mar 17 19:33:33 2026
@@ -1,23 +1,12 @@
-$NetBSD: patch-tests_CMakeLists.txt,v 1.2 2025/05/01 18:19:22 tnn Exp $
+$NetBSD: patch-tests_CMakeLists.txt,v 1.3 2026/03/17 19:33:33 bsiegert Exp $
 
 * OpenSSH 10 support
 * Search for sshd also in /usr/lib/ssh where it is located
   in SunOS/SmartOS.
 
---- tests/CMakeLists.txt.orig  2024-08-29 13:01:56.000000000 +0000
+--- tests/CMakeLists.txt.orig  2026-02-10 09:47:00.000000000 +0000
 +++ tests/CMakeLists.txt
-@@ -100,8 +100,8 @@ add_subdirectory(unittests)
- find_program(SSH_EXECUTABLE NAMES ssh)
- if (SSH_EXECUTABLE)
-     execute_process(COMMAND ${SSH_EXECUTABLE} -V ERROR_VARIABLE OPENSSH_VERSION_STR)
--    string(REGEX REPLACE "^.*OpenSSH_([0-9]).[0-9].*$" "\\1" OPENSSH_VERSION_MAJOR "${OPENSSH_VERSION_STR}")
--    string(REGEX REPLACE "^.*OpenSSH_[0-9].([0-9]).*$" "\\1" OPENSSH_VERSION_MINOR "${OPENSSH_VERSION_STR}")
-+    string(REGEX REPLACE "^.*OpenSSH_([0-9]+)[.]([0-9]+).*$" "\\1" OPENSSH_VERSION_MAJOR "${OPENSSH_VERSION_STR}")
-+    string(REGEX REPLACE "^.*OpenSSH_([0-9]+)[.]([0-9]+).*$" "\\2" OPENSSH_VERSION_MINOR "${OPENSSH_VERSION_STR}")
-     set(OPENSSH_VERSION "${OPENSSH_VERSION_MAJOR}.${OPENSSH_VERSION_MINOR}")
-     if("${OPENSSH_VERSION}" VERSION_LESS "6.3")
-         # ssh - Q was introduced in 6.3
-@@ -168,7 +168,8 @@ find_program(SSHD_EXECUTABLE
+@@ -192,7 +192,8 @@ find_program(SSHD_EXECUTABLE
               PATHS
                  /sbin
                  /usr/sbin
@@ -25,16 +14,5 @@ $NetBSD: patch-tests_CMakeLists.txt,v 1.
 +                /usr/local/sbin
 +                /usr/lib/ssh)
  
- if (CLIENT_TESTING OR SERVER_TESTING)
-     find_package(socket_wrapper 1.1.5 REQUIRED)
-@@ -212,8 +213,8 @@ if (CLIENT_TESTING OR SERVER_TESTING)
-     find_program(SSH_EXECUTABLE NAMES ssh)
-     if (SSH_EXECUTABLE)
-         execute_process(COMMAND ${SSH_EXECUTABLE} -V ERROR_VARIABLE OPENSSH_VERSION_STR)
--        string(REGEX REPLACE "^.*OpenSSH_([0-9]).[0-9].*$" "\\1" OPENSSH_VERSION_MAJOR "${OPENSSH_VERSION_STR}")
--        string(REGEX REPLACE "^.*OpenSSH_[0-9].([0-9]).*$" "\\1" OPENSSH_VERSION_MINOR "${OPENSSH_VERSION_STR}")
-+        string(REGEX REPLACE "^.*OpenSSH_([0-9]+)[.]([0-9]+).*$" "\\1" OPENSSH_VERSION_MAJOR "${OPENSSH_VERSION_STR}")
-+        string(REGEX REPLACE "^.*OpenSSH_([0-9]+)[.]([0-9]+).*$" "\\2" OPENSSH_VERSION_MINOR "${OPENSSH_VERSION_STR}")
-         add_definitions(-DOPENSSH_VERSION_MAJOR=${OPENSSH_VERSION_MAJOR} -DOPENSSH_VERSION_MINOR=${OPENSSH_VERSION_MINOR})
-     endif()
- 
+ if (WITH_PKCS11_URI)
+     find_package(softhsm)



Home | Main Index | Thread Index | Old Index