forked from pool/libssh
- Update to version 0.11.2 * Security: * CVE-2025-4877 - Write beyond bounds in binary to base64 conversion (bsc#1245309) * CVE-2025-4878 - Use of uninitialized variable in privatekey_from_file() (bsc#1245310) * CVE-2025-5318 - Likely read beyond bounds in sftp server handle management (bsc#1245311) * CVE-2025-5351 - Double free in functions exporting keys (bsc#1245312) * CVE-2025-5372 - ssh_kdf() returns a success code on certain failures (bsc#1245314) * CVE-2025-5449 - Likely read beyond bounds in sftp server message decoding (bsc#1245316) * CVE-2025-5987 - Invalid return code for chacha20 poly1305 with OpenSSL (bsc#1245317) * Compatibility * Fixed compatibility with CPM.cmake * Compatibility with OpenSSH 10.0 * Tests compatibility with new Dropbear releases * Removed p11-kit remoting from the pkcs11 testsuite * Bugfixes * Implement missing packet filter for DH GEX * Properly process the SSH2_MSG_DEBUG message * Allow escaping quotes in quoted arguments to ssh configuration * Do not fail with unknown match keywords in ssh configuration * Process packets before selecting signature algorithm during authentication * Do not fail hard when the SFTP status message is not sent by noncompliant servers - Removed libssh-CmakeLists-Fix-multiple-digit-major-version-for-OpenSSH.patch - Removed libssh-misc-Fix-OpenSSH-banner-parsing.patch OBS-URL: https://build.opensuse.org/request/show/1288631 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libssh?expand=0&rev=79
36 lines
1.3 KiB
Diff
36 lines
1.3 KiB
Diff
From 886e0288a7f27d11fc0020b48c5d4be997293b04 Mon Sep 17 00:00:00 2001
|
|
From: Lucas Mulling <lucas.mulling@suse.com>
|
|
Date: Mon, 2 Jun 2025 11:48:58 -0300
|
|
Subject: [PATCH] tests: Fix an issue where torture_session request a SIGTERM
|
|
too early
|
|
|
|
Signed-off-by: Lucas Mulling <lucas.mulling@suse.com>
|
|
---
|
|
tests/client/torture_session.c | 14 ++++++++++++--
|
|
1 file changed, 12 insertions(+), 2 deletions(-)
|
|
|
|
diff --git a/tests/client/torture_session.c b/tests/client/torture_session.c
|
|
index cc83578f..6c10dee1 100644
|
|
--- a/tests/client/torture_session.c
|
|
+++ b/tests/client/torture_session.c
|
|
@@ -447,6 +447,16 @@ static void torture_channel_exit_signal(void **state)
|
|
/* Make the request, read parts with close */
|
|
rc = ssh_channel_request_exec(channel, request);
|
|
assert_ssh_return_code(session, rc);
|
|
+
|
|
+ /* FIX-SUSE bsc#1243799: Wait a bit before sending the SIGTERM. In real
|
|
+ * world use chases this should not happen has there will be network delays,
|
|
+ * since we are running the tests locally, it can happen that the server has
|
|
+ * yet to spawn the child (by this setting the correct group id). Meaning
|
|
+ * when we request TERM the correct gids are not setup and killpg will not
|
|
+ * work.
|
|
+ */
|
|
+ sleep(1);
|
|
+
|
|
rc = ssh_channel_request_send_signal(channel, "TERM");
|
|
assert_ssh_return_code(session, rc);
|
|
|
|
--
|
|
2.49.0
|
|
|