Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libssh4-0.9.8-150600.9.1 RPM for s390x

From OpenSuSE Leap 15.6 for s390x

Name: libssh4 Distribution: SUSE Linux Enterprise 15
Version: 0.9.8 Vendor: SUSE LLC <https://www.suse.com/>
Release: 150600.9.1 Build date: Wed Apr 10 11:50:24 2024
Group: System/Libraries Build host: s390zp34
Size: 505812 Source RPM: libssh-0.9.8-150600.9.1.src.rpm
Packager: https://www.suse.com/
Url: https://www.libssh.org
Summary: SSH library
An SSH implementation in the form of a library. With libssh, you can remotely
execute programs, transfer files, use a secure and transparent tunnel for your
remote programs. It supports SFTP as well.

This package provides libssh from https://www.libssh.org that should not be
confused with libssh2 available from https://www.libssh2.org (libssh2 package)

Provides

Requires

License

LGPL-2.1-or-later

Changelog

* Thu Feb 29 2024 adam.majer@suse.de
  - Fix regression parsing IPv6 addresses provided as hostname (bsc#1220385)
    * Added libssh-fix-ipv6-hostname-regression.patch
* Thu Jan 11 2024 wolfgang.frisch@suse.com
  - Update to version 0.9.8
    * Fix CVE-2023-6004: Command injection using proxycommand (bsc#1218209)
    * Fix CVE-2023-48795: Potential downgrade attack using strict kex (bsc#1218126)
    * Fix CVE-2023-6918: Missing checks for return values of MD functions (bsc#1218186)
    * Allow @ in usernames when parsing from URI composes
  - Update to version 0.9.7
    * Fix CVE-2023-1667: a NULL dereference during rekeying with algorithm
      guessing (bsc#1211188)
    * Fix CVE-2023-2283: a possible authorization bypass in
      pki_verify_data_signature under low-memory conditions (bsc#1211190)
    * Fix several memory leaks in GSSAPI handling code
* Thu Aug 26 2021 asn@cryptomilk.org
  - Update to version 0.9.6 (bsc#1189608, CVE-2021-3634)
    * https://git.libssh.org/projects/libssh.git/tag/?h=libssh-0.9.6
* Mon Sep 21 2020 asn@cryptomilk.org
  - Add missing BR for openssh needed for tests
* Sun Sep 13 2020 dmueller@suse.com
  - update to 0.9.5 (bsc#1174713, CVE-2020-16135):
    * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232)
    * Improve handling of library initialization (T222)
    * Fix parsing of subsecond times in SFTP (T219)
    * Make the documentation reproducible
    * Remove deprecated API usage in OpenSSL
    * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN
    * Define version in one place (T226)
    * Prevent invalid free when using different C runtimes than OpenSSL (T229)
    * Compatibility improvements to testsuite
* Thu Apr 09 2020 asn@cryptomilk.org
  - Update to version 0.9.4
    * https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/
    * Fix possible Denial of Service attack when using AES-CTR-ciphers
      CVE-2020-1730 (bsc#1168699)
* Tue Feb 18 2020 dimstar@opensuse.org
  - Drop the hack to pull curl-mini: we moved the split a bit higher
    up and now have a non-curl linked variant of cmake in
    openSUSE:Factory.
* Tue Dec 10 2019 asn@cryptomilk.org
  - Update to version 0.9.3
    * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095)
    * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state
    * SSH-01-006 General: Various unchecked Null-derefs cause DOS
    * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys
    * SSH-01-010 SSH: Deprecated hash function in fingerprinting
    * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS
    * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access
    * SSH-01-001 State Machine: Initial machine states should be set explicitly
    * SSH-01-002 Kex: Differently bound macros used to iterate same array
    * SSH-01-005 Code-Quality: Integer sign confusion during assignments
    * SSH-01-008 SCP: Protocol Injection via unescaped File Names
    * SSH-01-009 SSH: Update documentation which RFCs are implemented
    * SSH-01-012 PKI: Information leak via uninitialized stack buffer
* Mon Dec 09 2019 dimstar@opensuse.org
  - Rename suffix define to pkg_suffix: rpm 4.15 has suffix reserved
    for internal use.
* Thu Nov 07 2019 asn@cryptomilk.org
  - Update to version 0.9.2
    * Fixed libssh-config.cmake
    * Fixed issues with rsa algorithm negotiation (T191)
    * Fixed detection of OpenSSL ed25519 support (T197)
* Fri Oct 25 2019 asn@cryptomilk.org
  - Update to version 0.9.1
    * Added support for Ed25519 via OpenSSL
    * Added support for X25519 via OpenSSL
    * Added support for localuser in Match keyword
    * Fixed Match keyword to be case sensitive
    * Fixed compilation with LibreSSL
    * Fixed error report of channel open (T75)
    * Fixed sftp documentation (T137)
    * Fixed known_hosts parsing (T156)
    * Fixed build issue with MinGW (T157)
    * Fixed build with gcc 9 (T164)
    * Fixed deprecation issues (T165)
    * Fixed known_hosts directory creation (T166)
* Wed Jul 10 2019 tchvatal@suse.com
  - Split out configuration to separate package to not mess up the
    library packaging and coinstallation
* Fri Jun 28 2019 asn@cryptomilk.org
  - Update to verion 0.9.0
    * Added support for AES-GCM
    * Added improved rekeying support
    * Added performance improvements
    * Disabled blowfish support by default
    * Fixed several ssh config parsing issues
    * Added support for DH Group Exchange KEX
    * Added support for Encrypt-then-MAC mode
    * Added support for parsing server side configuration file
    * Added support for ECDSA/Ed25519 certificates
    * Added FIPS 140-2 compatibility
    * Improved known_hosts parsing
    * Improved documentation
    * Improved OpenSSL API usage for KEX, DH, and signatures
  - Removed 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch
  - Removed 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch
  - Removed 0001-tests-Add-aes-gcm-ciphers-tests.patch
  - Add libssh client and server config files
* Wed May 29 2019 idonmez@suse.com
  - Fix the typo in Obsoletes for -devel-doc subpackage
  - Actually remove the description for -devel-doc subpackage
* Thu May 23 2019 jmcdonough@suse.com
  - Add support for new AES-GCM encryption types; (bsc#1134193)
    * Add 0001-libcrypto-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch
    * Add 0001-libgcrypt-Implement-OpenSSH-compatible-AES-GCM-ciphe.patch
    * Add 0001-tests-Add-aes-gcm-ciphers-tests.patch
* Thu Feb 28 2019 coolo@suse.com
  - Avoid build cycle between curl and libssh by using obs hint to
    prefer curl-mini
* Mon Feb 25 2019 asn@cryptomilk.org
  - Update to version 0.8.7
    * Fixed handling extension flags in the server implementation
    * Fixed exporting ed25519 private keys
    * Fixed corner cases for rsa-sha2 signatures
    * Fixed some issues with connector
* Mon Feb 11 2019 tchvatal@suse.com
  - Drop doxygen from dependencies to avoid buildcycle
    * the documentation is available online anyway for anyone to
      consume and consult http://api.libssh.org
* Tue Jan 08 2019 pmonrealgonzalez@suse.com
  - Added the tests in a multiple build description file *test* to
    break the cycle for cmocka, curl, doxygen and libssh.
* Sun Dec 30 2018 asn@cryptomilk.org
  - Update to version 0.8.6
    * Fixed compilation issues with different OpenSSL versions
    * Fixed StrictHostKeyChecking in new knownhosts API
    * Fixed ssh_send_keepalive() with packet filter
    * Fixed possible crash with knownhosts options
    * Fixed issus with rekeying
    * Fixed strong ECDSA keys
    * Fixed some issues with rsa-sha2 extentions
    * Fixed access violation in ssh_init() (static linking)
    * Fixed ssh_channel_close() handling
* Mon Oct 29 2018 asn@cryptomilk.org
  - Update to version 0.8.5
    * Added support to get known_hosts locations with ssh_options_get()
    * Fixed preferred algorithm for known hosts negotiations
    * Fixed KEX with some server implementations (e.g. Cisco)
    * Fixed issues with MSVC
    * Fixed keyboard-interactive auth in server mode
      (regression from CVE-2018-10933)
    * Fixed gssapi auth in server mode (regression from CVE-2018-10933)
    * Fixed socket fd handling with proxy command
    * Fixed a memory leak with OpenSSL
* Tue Oct 16 2018 asn@cryptomilk.org
  - Update to version 0.8.4
    * Fixed CVE-2018-10933; (bsc#1108020)
    * Fixed building without globbing support
    * Fixed possible memory leaks
    * Avoid SIGPIPE on sockets
* Fri Sep 21 2018 asn@cryptomilk.org
  - Update to version 0.8.3
    * Added support for rsa-sha2
    * Added support to parse private keys in openssh container format
      (other than ed25519)
    * Added support for diffie-hellman-group18-sha512 and
      diffie-hellman-group16-sha512
    * Added ssh_get_fingerprint_hash()
    * Added ssh_pki_export_privkey_base64()
    * Added support for Match keyword in config file
    * Improved performance and reduced memory footprint for sftp
    * Fixed ecdsa publickey auth
    * Fixed reading a closed channel
    * Added support to announce posix-rename@openssh.com and
      hardlink@openssh.com in the sftp server
  - Removed patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch
* Thu Aug 30 2018 asn@cryptomilk.org
  - Update to version 0.8.2
    * Added sha256 fingerprints for pubkeys
    * Improved compiler flag detection
    * Fixed race condition in reading sftp messages
    * Fixed doxygen generation and added modern style
    * Fixed library initialization on Windows
    * Fixed __bounded__ attribute detection
    * Fixed a bug in the options parser
    * Fixed documentation for new knwon_hosts API
  - Added patch: 0001-poll-Fix-size-types-in-ssh_event_free.patch
    * Fix compiler warning on SLE12
* Mon Aug 27 2018 vcizek@suse.com
  - Add missing zlib-devel dependency which was previously pulled in
    by libopenssl-devel
* Tue Aug 14 2018 asn@cryptomilk.org
  - Remove the libssh_threads.so symlink
* Mon Aug 13 2018 asn@cryptomilk.org
  - Update to version 0.8.1
    * Fixed version number in the header
    * Fixed version number in pkg-config and cmake config
    * Fixed library initialization
    * Fixed attribute detection
* Fri Aug 10 2018 asn@cryptomilk.org
  - Update to version 0.8.0
    * Removed support for deprecated SSHv1 protocol
    * Added new connector API for clients
    * Added new known_hosts parsing API
    * Added support for OpenSSL 1.1
    * Added support for chacha20-poly1305 cipher
    * Added crypto backend for mbedtls crypto library
    * Added ECDSA support with gcrypt backend
    * Added advanced client and server testing using cwrap.org
    * Added support for curve25519-sha256 alias
    * Added support for global known_hosts file
    * Added support for symbol versioning
    * Improved ssh_config parsing
    * Improved threading support
  - Removed 0001-libcrypto-Remove-AES_ctr128_encrypt.patch
  - Removed 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch
  - Removed 0001-libcrypto-Use-newer-API-for-HMAC.patch
  - Removed 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch
  - Removed 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch
  - Removed 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch
  - Removed 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch
  - Removed 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch
  - Removed 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch
* Fri Mar 09 2018 jmcdonough@suse.com
  - Disable timeout testing on slow build systems (bsc#1084713)
    * 0001-disable-timeout-test-on-slow-buildsystems.patch
* Sun Dec 24 2017 fabian@ritter-vogt.de
  - Add patch to fix parsing of config files (boo#1067782):
    * 0001-config-Bugfix-Dont-skip-unseen-opcodes.patch
* Fri Sep 15 2017 vcizek@suse.com
  - add support for building with OpenSSL 1.1 (bsc#1055266)
    * added patches:
    * 0001-cmake-Use-configure-check-for-CRYPTO_ctr128_encrypt.patch
    * 0001-libcrypto-Introduce-a-libcrypto-compat-file.patch
    * 0001-libcrypto-Remove-AES_ctr128_encrypt.patch
    * 0001-libcrypto-Use-a-pointer-for-EVP_MD_CTX.patch
    * 0001-libcrypto-Use-a-pointer-for-EVP_CIPHER_CTX.patch
    * 0001-libcrypto-Use-newer-API-for-HMAC.patch
    * 0001-pki_crypto-Use-getters-and-setters-for-opaque-keys-a.patch
    * 0001-threads-Use-new-API-call-for-OpenSSL-CRYPTO-THREADID.patch
* Mon Jul 31 2017 astieger@suse.com
  - add package keyring and verify source signature
* Thu Apr 13 2017 asn@cryptomilk.org
  - Update to version 0.7.5
    * Fixed a memory allocation issue with buffers
    * Fixed PKI on Windows
    * Fixed some SSHv1 functions
    * Fixed config hostname expansion
* Wed Feb 08 2017 asn@cryptomilk.org
  - Update to version 0.7.4
    * Added id_ed25519 to the default identity list
    * Fixed sftp EOF packet handling
    * Fixed ssh_send_banner() to confirm with RFC 4253
    * Fixed some memory leaks
  - Removed patch gcc5-fixes.patch
* Wed Dec 07 2016 jengelh@inai.de
  - Update descriptions. Drop redundant pkgconfig require
    (it's autodetected).
* Wed Oct 07 2015 asn@cryptomilk.org
  - Update to version 0.7.2
    * Fixed OpenSSL detection on Windows
    * Fixed return status for ssh_userauth_agent()
    * Fixed KEX to prefer hmac-sha2-256
    * Fixed sftp packet handling
    * Fixed return values of ssh_key_is_(public|private)
    * Fixed bug in global success reply
* Mon Jul 20 2015 tchvatal@suse.com
  - Enable testsuite run to check the state of libssh itself
  - Use SUSE macros to define environment clearly
  - Enable gssapi by adding krb5 dependency
* Tue Jun 30 2015 asn@cryptomilk.org
  - Update to version 0.7.1
    * Fixed SSH_AUTH_PARTIAL auth with auto public key
    * Fixed memory leak in session options
    * Fixed allocation of ed25519 public keys
    * Fixed channel exit-status and exit-signal
    * Reintroduce ssh_forward_listen()
* Mon May 11 2015 asn@cryptomilk.org
  - Update to version 0.7.0
    * Added support for ed25519 keys
    * Added SHA2 algorithms for HMAC
    * Added improved and more secure buffer handling code
    * Added callback for auth_none_function
    * Added support for ECDSA private key signing
    * Added more tests
    * Fixed a lot of bugs
    * Improved API documentation
* Wed May 06 2015 dmueller@suse.com
  - add gcc5-fixes.patch: Fix build against GCC 5.x
* Thu Apr 30 2015 asn@cryptomilk.org
  - Update to version 0.6.5
    * Fixed CVE-2015-3146
    * Fixed port handling in config file
    * Fixed the build with libgcrypt
    * Fixed SFTP endian issues (rlo #179)
    * Fixed uninitilized sig variable (rlo #167)
    * Fixed polling issues which could result in a hang
    * Fixed handling of EINTR in ssh_poll() (rlo #186)
    * Fixed C99 issues with __func__
    * Fixed some memory leaks
    * Improved macro detection on Windows
* Thu Jan 22 2015 coolo@suse.com
  - removing argument from popd
  - add baselibs.conf as source
* Fri Dec 19 2014 asn@cryptomilk.org
  - Update to version 0.6.4
    * Fixed CVE-2014-8132.
    * Added SHA-2 for session ID signing with ECDSA keys.
    * Added support for ECDSA host keys.
    * Added support for more ECDSA hostkey algorithms.
    * Added ssh_pki_key_ecdsa_name() API.
    * Fixed setting the bindfd only after successful listen.
    * Fixed issues with user created sockets.
    * Fixed several issues in libssh C++ wrapper.
    * Fixed several documentation issues.
    * Fixed channel exit-signal request.
    * Fixed X11 request screen number in messages.
    * Fixed several memory leaks.

Files

/usr/lib64/libssh.so.4
/usr/lib64/libssh.so.4.8.9
/usr/share/doc/packages/libssh4
/usr/share/doc/packages/libssh4/AUTHORS
/usr/share/doc/packages/libssh4/ChangeLog
/usr/share/doc/packages/libssh4/README


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Jul 9 20:22:04 2024