git: 0e3bea17bd07 - main - security/vuxml: Document libssh vulnerability
Po-Chuan Hsieh
sunpoet at FreeBSD.org
Tue Sep 21 04:01:09 UTC 2021
The branch main has been updated by sunpoet:
URL: https://cgit.FreeBSD.org/ports/commit/?id=0e3bea17bd07912565978ca2d526bb483c15b70d
commit 0e3bea17bd07912565978ca2d526bb483c15b70d
Author: Po-Chuan Hsieh <sunpoet at FreeBSD.org>
AuthorDate: 2021-09-21 03:27:53 +0000
Commit: Po-Chuan Hsieh <sunpoet at FreeBSD.org>
CommitDate: 2021-09-21 03:47:26 +0000
security/vuxml: Document libssh vulnerability
---
security/vuxml/vuln-2021.xml | 38 ++++++++++++++++++++++++++++++++++++++
1 file changed, 38 insertions(+)
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index 14948e7a6d86..2baf51425253 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -1,3 +1,41 @@
+ <vuln vid="57b1ee25-1a7c-11ec-9376-0800272221cc">
+ <topic>libssh -- possible heap-buffer overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>libssh</name>
+ <range><ge>0.9.1</ge><le>0.9.5</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>libssh security advisories:</p>
+ <blockquote cite="https://www.libssh.org/security/advisories/CVE-2021-3634.txt">
+ <p>The SSH protocol keeps track of two shared secrets during the lifetime
+ of the session. One of them is called `secret_hash` and and the other
+ `session_id`. Initially, both of them are the same, but after key
+ re-exchange, previous `session_id` is kept and used as an input to new
+ `secret_hash`.</p>
+ <p>Historically, both of these buffers had shared length variable, which
+ worked as long as these buffers were same. But the key re-exchange
+ operation can also change the key exchange method, which can be based on
+ hash of different size, eventually creating `secret_hash` of different
+ size than the `session_id` has.</p>
+ <p>This becomes an issue when the `session_id` memory is zeroized or when
+ it is used again during second key re-exchange.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-3634</cvename>
+ <url>https://www.libssh.org/security/advisories/CVE-2021-3634.txt</url>
+ <url>https://www.libssh.org/2021/08/26/libssh-0-9-6-security-release/</url>
+ </references>
+ <dates>
+ <discovery>2021-08-26</discovery>
+ <entry>2021-09-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="882a38f9-17dd-11ec-b335-d4c9ef517024">
<topic>Apache httpd -- multiple vulnerabilities</topic>
<affects>
More information about the dev-commits-ports-all
mailing list