SHA256
8
0
forked from pool/libssh
Files
libssh/libssh-tests-Fix-an-issue-where-torture_session-request-a-SIGTERM-too-early.patch
Ana Guerrero f741729d58 Accepting request 1288631 from devel:libraries:c_c++
- Update to version 0.11.2
  * Security:
    * CVE-2025-4877 - Write beyond bounds in binary to base64 conversion (bsc#1245309)
    * CVE-2025-4878 - Use of uninitialized variable in privatekey_from_file() (bsc#1245310)
    * CVE-2025-5318 - Likely read beyond bounds in sftp server handle management (bsc#1245311)
    * CVE-2025-5351 - Double free in functions exporting keys (bsc#1245312)
    * CVE-2025-5372 - ssh_kdf() returns a success code on certain failures (bsc#1245314)
    * CVE-2025-5449 - Likely read beyond bounds in sftp server message decoding (bsc#1245316)
    * CVE-2025-5987 - Invalid return code for chacha20 poly1305 with OpenSSL (bsc#1245317)
  * Compatibility
    * Fixed compatibility with CPM.cmake
    * Compatibility with OpenSSH 10.0
    * Tests compatibility with new Dropbear releases
    * Removed p11-kit remoting from the pkcs11 testsuite
  * Bugfixes
    * Implement missing packet filter for DH GEX
    * Properly process the SSH2_MSG_DEBUG message
    * Allow escaping quotes in quoted arguments to ssh configuration
    * Do not fail with unknown match keywords in ssh configuration
    * Process packets before selecting signature algorithm during authentication
    * Do not fail hard when the SFTP status message is not sent by noncompliant
      servers
- Removed libssh-CmakeLists-Fix-multiple-digit-major-version-for-OpenSSH.patch
- Removed libssh-misc-Fix-OpenSSH-banner-parsing.patch

OBS-URL: https://build.opensuse.org/request/show/1288631
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libssh?expand=0&rev=79
2025-06-27 21:00:44 +00:00

36 lines
1.3 KiB
Diff

From 886e0288a7f27d11fc0020b48c5d4be997293b04 Mon Sep 17 00:00:00 2001
From: Lucas Mulling <lucas.mulling@suse.com>
Date: Mon, 2 Jun 2025 11:48:58 -0300
Subject: [PATCH] tests: Fix an issue where torture_session request a SIGTERM
too early
Signed-off-by: Lucas Mulling <lucas.mulling@suse.com>
---
tests/client/torture_session.c | 14 ++++++++++++--
1 file changed, 12 insertions(+), 2 deletions(-)
diff --git a/tests/client/torture_session.c b/tests/client/torture_session.c
index cc83578f..6c10dee1 100644
--- a/tests/client/torture_session.c
+++ b/tests/client/torture_session.c
@@ -447,6 +447,16 @@ static void torture_channel_exit_signal(void **state)
/* Make the request, read parts with close */
rc = ssh_channel_request_exec(channel, request);
assert_ssh_return_code(session, rc);
+
+ /* FIX-SUSE bsc#1243799: Wait a bit before sending the SIGTERM. In real
+ * world use chases this should not happen has there will be network delays,
+ * since we are running the tests locally, it can happen that the server has
+ * yet to spawn the child (by this setting the correct group id). Meaning
+ * when we request TERM the correct gids are not setup and killpg will not
+ * work.
+ */
+ sleep(1);
+
rc = ssh_channel_request_send_signal(channel, "TERM");
assert_ssh_return_code(session, rc);
--
2.49.0