Hello Salvatore and Laurent,

Salvatore Bonaccorso [2021-08-26 22:21 +0200]:
> The following vulnerability was published for libssh.
> 
> CVE-2021-3634[0]:
> | Possible heap-buffer overflow when rekeying
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

I backported the security fix, the AEAD handshake failure fix, and two
(trivial) memory leak fixes, in the first three commits here:

  https://salsa.debian.org/debian/libssh/-/commits/bullseye-security

The fourth is just administrative (tell git-buildpackage about the new
bullseye-security branch) and not user-visible.

The (mostly autogenerated) changelook would look like this:

libssh (0.9.5-1+deb11u1) bullseye-security; urgency=high

  * dh-gex: Avoid memory leaks.
    Add 0001-dh-gex-Avoid-memory-leaks.patch: Backported from upstream 0.9.6
    release.
  * Fix handshake bug with AEAD ciphers and no HMAC overlap.
    Add 0002-Fix-handshake-bug-with-AEAD-ciphers-and-no-HMAC-over.patch and 
    0003-Add-initial-server-algorithm-test-for-no-HMAC-overla.patch:
    Backport fix and test from upstream 0.9.6 release.
  * Create a separate length for session_id.
    Add 0004-CVE-2021-3634-Create-a-separate-length-for-session_i.patch and 
    0005-tests-Simple-reproducer-for-rekeying-with-different-.patch:
    Backport fix and test from upstream 0.9.6 release.
    CVE-2021-3634 (Closes: #993046)

 -- Martin Pitt <mp...@debian.org>  Sat, 28 Aug 2021 13:52:11 +0200

Is that ok with you, in particular the not-quite-CVE patches? Should I upload
directly or put the dsc somewhere?

Laurent, ok with you or do you have something else?

Thanks,

Martin

Reply via email to