Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libssh4 | Distribution: openSUSE Leap 15.2 |
Version: 0.8.7 | Vendor: openSUSE |
Release: lp152.4.1 | Build date: Tue Apr 14 14:37:57 2020 |
Group: System/Libraries | Build host: obs-arm-3 |
Size: 619830 | Source RPM: libssh-0.8.7-lp152.4.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.libssh.org | |
Summary: SSH library |
An SSH implementation in the form of a library. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. It supports SFTP as well. This package provides libssh from https://www.libssh.org that should not be confused with libssh2 available from https://www.libssh2.org (libssh2 package)
LGPL-2.1-or-later
* Mon Apr 06 2020 James McDonough <jmcdonough@suse.com> - Fix possible Denial of Service attack when using AES-CTR ciphers; (bsc#1168699) * Add 0001-CVE-2020-1730-Fix-a-possible-segfault-when-zeroing-A.patch * Mon Jan 13 2020 James McDonough <jmcdonough@suse.com> - Update to latest version of patch for CVE-2019-14889; (bsc#1158095) * Update CVE-2019-14889.patch * Tue Dec 03 2019 James McDonough <jmcdonough@suse.com> - Fix CVE-2019-14889: arbitrary command execution; (bsc#1158095) * Add CVE-2019-14889.patch * Wed May 29 2019 Ismail Dönmez <idonmez@suse.com> - Fix the typo in Obsoletes for -devel-doc subpackage - Actually remove the description for -devel-doc subpackage * Thu May 23 2019 James McDonough <jmcdonough@suse.com> - Add support for new AES-GCM encryption types; (bsc#1134193) * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch * Thu Feb 28 2019 Stephan Kulow <coolo@suse.com> - Avoid build cycle between curl and libssh by using obs hint to prefer curl-mini * Mon Feb 25 2019 Andreas Schneider <asn@cryptomilk.org> - Update to version 0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector * Mon Feb 11 2019 Tomáš Chvátal <tchvatal@suse.com> - Drop doxygen from dependencies to avoid buildcycle * the documentation is available online anyway for anyone to consume and consult http://api.libssh.org * Tue Jan 08 2019 Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com> - Added the tests in a multiple build description file *test* to break the cycle for cmocka, curl, doxygen and libssh. * Sun Dec 30 2018 Andreas Schneider <asn@cryptomilk.org> - Update to version 0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling * Mon Oct 29 2018 Andreas Schneider <asn@cryptomilk.org> - Update to version 0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL * Tue Oct 16 2018 Andreas Schneider <asn@cryptomilk.org> - Update to version 0.8.4 * Fixed CVE-2018-10933; (bsc#1108020) * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets * Fri Sep 21 2018 Andreas Schneider <asn@cryptomilk.org> - Update to version 0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Thu Aug 30 2018 Andreas Schneider <asn@cryptomilk.org> - Update to version 0.8.2 * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch * Fix compiler warning on SLE12 * Mon Aug 27 2018 vcizek@suse.com - Add missing zlib-devel dependency which was previously pulled in by libopenssl-devel * Tue Aug 14 2018 asn@cryptomilk.org - Remove the libssh_threads.so symlink * Mon Aug 13 2018 asn@cryptomilk.org - Update to version 0.8.1 * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection * Fri Aug 10 2018 asn@cryptomilk.org - Update to version 0.8.0 * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch * Fri Mar 09 2018 jmcdonough@suse.com - Disable timeout testing on slow build systems (bsc#1084713) * 0001-disable-timeout-test-on-slow-buildsystems.patch * Sun Dec 24 2017 fabian@ritter-vogt.de - Add patch to fix parsing of config files (boo#1067782): * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch * Fri Sep 15 2017 vcizek@suse.com - add support for building with OpenSSL 1.1 (bsc#1055266) * added patches: * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch * 0001-libcrypto-Use-newer-API-for-HMAC.patch * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch * Mon Jul 31 2017 astieger@suse.com - add package keyring and verify source signature * Thu Apr 13 2017 asn@cryptomilk.org - Update to version 0.7.5 * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion * Wed Feb 08 2017 asn@cryptomilk.org - Update to version 0.7.4 * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks - Removed patch gcc5-fixes.patch * Wed Dec 07 2016 jengelh@inai.de - Update descriptions. Drop redundant pkgconfig require (it's autodetected). * Wed Oct 07 2015 asn@cryptomilk.org - Update to version 0.7.2 * Fixed OpenSSL detection on Windows * Fixed return status for ssh_userauth_agent() * Fixed KEX to prefer hmac-sha2-256 * Fixed sftp packet handling * Fixed return values of ssh_key_is_(public|private) * Fixed bug in global success reply * Mon Jul 20 2015 tchvatal@suse.com - Enable testsuite run to check the state of libssh itself - Use SUSE macros to define environment clearly - Enable gssapi by adding krb5 dependency * Tue Jun 30 2015 asn@cryptomilk.org - Update to version 0.7.1 * Fixed SSH_AUTH_PARTIAL auth with auto public key * Fixed memory leak in session options * Fixed allocation of ed25519 public keys * Fixed channel exit-status and exit-signal * Reintroduce ssh_forward_listen() * Mon May 11 2015 asn@cryptomilk.org - Update to version 0.7.0 * Added support for ed25519 keys * Added SHA2 algorithms for HMAC * Added improved and more secure buffer handling code * Added callback for auth_none_function * Added support for ECDSA private key signing * Added more tests * Fixed a lot of bugs * Improved API documentation * Wed May 06 2015 dmueller@suse.com - add gcc5-fixes.patch: Fix build against GCC 5.x * Thu Apr 30 2015 asn@cryptomilk.org - Update to version 0.6.5 * Fixed CVE-2015-3146 * Fixed port handling in config file * Fixed the build with libgcrypt * Fixed SFTP endian issues (rlo #179) * Fixed uninitilized sig variable (rlo #167) * Fixed polling issues which could result in a hang * Fixed handling of EINTR in ssh_poll() (rlo #186) * Fixed C99 issues with __func__ * Fixed some memory leaks * Improved macro detection on Windows * Thu Jan 22 2015 coolo@suse.com - removing argument from popd - add baselibs.conf as source * Fri Dec 19 2014 asn@cryptomilk.org - Update to version 0.6.4 * Fixed CVE-2014-8132. * Added SHA-2 for session ID signing with ECDSA keys. * Added support for ECDSA host keys. * Added support for more ECDSA hostkey algorithms. * Added ssh_pki_key_ecdsa_name() API. * Fixed setting the bindfd only after successful listen. * Fixed issues with user created sockets. * Fixed several issues in libssh C++ wrapper. * Fixed several documentation issues. * Fixed channel exit-signal request. * Fixed X11 request screen number in messages. * Fixed several memory leaks.
/usr/lib64/libssh.so.4 /usr/lib64/libssh.so.4.7.4 /usr/share/doc/packages/libssh4 /usr/share/doc/packages/libssh4/AUTHORS /usr/share/doc/packages/libssh4/ChangeLog /usr/share/doc/packages/libssh4/README
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 11:45:28 2024