CVE-2019-3861 log

Source
Severity High
Remote Yes
Type Information disclosure
Description
An issue has been found in libssh2 before 1.8.1 where a server could send a specially crafted SSH packet with a padding length value greater than the packet length. This would result in a buffer read out of bounds when decompressing the packet or result in a corrupted packet value.
Group Package Affected Fixed Severity Status Ticket
AVG-926 libssh2 1.8.0-3 1.8.1-1 Critical Fixed
Date Advisory Group Package Severity Type
22 Mar 2019 ASA-201903-12 AVG-926 libssh2 Critical multiple issues
References
https://www.libssh2.org/CVE-2019-3861.html
https://libssh2.org/1.8.0-CVE/CVE-2019-3861.patch