File libssh2_org.changes of Package libssh2_org.10479
-------------------------------------------------------------------
Wed May 29 11:11:06 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
- Fix upstream patch for CVE-2019-3860 [bsc#1136570, bsc#1128481]
* Added libssh2_org-CVE-2019-3860-fix.patch
-------------------------------------------------------------------
Fri Apr 26 13:10:14 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103]
- Added libssh2_org-CVE-2019-3859-fix.patch
-------------------------------------------------------------------
Wed Mar 13 15:24:11 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
- Store but don't use keys of unsupported types in the known_hosts file [bsc#1091236]
* Added libssh2_org-knownhosts-handle-unknown-key-types.patch
-------------------------------------------------------------------
Mon Mar 11 12:58:50 UTC 2019 - Pedro Monreal Gonzalez <pmonrealgonzalez@suse.com>
- Security fixes:
* [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport
read allows out-of-bounds write with specially crafted payload
- libssh2_org-CVE-2019-3855.patch
* [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard
interactive handling allows out-of-bounds write with specially
crafted payload
- libssh2_org-CVE-2019-3856.patch
* [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to
zero-byte allocation and out-of-bounds with specially crafted
message channel request SSH packet
- libssh2_org-CVE-2019-3857.patch
* [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading
to an out-of-bounds read with a specially crafted SFTP packet
- libssh2_org-CVE-2019-3858.patch
* [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially
crafted payloads due to unchecked use of _libssh2_packet_require
and _libssh2_packet_requirev
- libssh2_org-CVE-2019-3859.patch
* [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially
crafted SFTP packets
- libssh2_org-CVE-2019-3860.patch
* [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially
crafted SSH packets
- libssh2_org-CVE-2019-3861.patch
* [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with
specially crafted message channel request SSH packet
- libssh2_org-CVE-2019-3862.patch
* [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate
keyboard interactive allows out-of-bounds writes with specially
crafted keyboard responses
- libssh2_org-CVE-2019-3863.patch
-------------------------------------------------------------------
Tue Apr 19 13:17:39 UTC 2016 - pjanouch@suse.de
- add bsc974691.patch (bsc#974691)
- fix 0001-kex-Added-diffie-hellman-group-exchange-sha256-suppo.patch
(as per CVE-2016-0787)
-------------------------------------------------------------------
Tue Feb 23 12:51:39 UTC 2016 - vcizek@suse.com
- add SHA256 support for DH group exchange (fate#320343, bsc#961964)
* add patches:
0001-Add-support-for-HMAC-SHA-256-and-HMAC-SHA-512.patch
0001-kex-Added-diffie-hellman-group-exchange-sha256-suppo.patch
-------------------------------------------------------------------
Mon Feb 22 16:29:28 UTC 2016 - vcizek@suse.com
- fix CVE-2016-0787 (bsc#967026)
* Weakness in diffie-hellman secret key generation
* add CVE-2016-0787.patch
-------------------------------------------------------------------
Wed Jul 8 08:53:19 UTC 2015 - vcizek@suse.com
- properly detect EVP_aes_128_ctr at configure time (bsc#933336)
* added libssh2-configure_detect_aes_ctr.patch
-------------------------------------------------------------------
Mon Mar 9 13:17:40 UTC 2015 - vcizek@suse.com
- fix for CVE-2015-1782 (bnc#921070)
* unbounded read when negotiating a new session
* added CVE-2015-1782.patch
-------------------------------------------------------------------
Mon Jun 24 12:58:02 UTC 2013 - mvyskocil@suse.com
- ignore groff-full to remove factory build cycle
- add groff to build requires to make tests passing
-------------------------------------------------------------------
Wed Apr 24 07:54:17 UTC 2013 - boris@steki.net
- fix building on older kernels and older OS / SLE
-------------------------------------------------------------------
Thu Feb 28 21:13:29 UTC 2013 - crrodriguez@opensuse.org
- Use AC_CONFIG_HEADERS instead of AM_CONFIG_HEADER, fixes
build with new automake
-------------------------------------------------------------------
Tue Jan 8 15:24:25 UTC 2013 - vcizek@suse.com
- update to 1.4.3
compression: add support for zlib@openssh.com
Bug fixes:
sftp_read: return error if a too large package arrives
libssh2_hostkey_hash.3: update the description of return value
examples: use stderr for messages, stdout for data
openssl: do not leak memory when handling errors
improved handling of disabled MD5 algorithm in OpenSSL
known_hosts: Fail when parsing unknown keys in known_hosts file
configure: gcrypt doesn't come with pkg-config support
session_free: wrong variable used for keeping state
libssh2_userauth_publickey_fromfile_ex.3: mention publickey == NULL
comp_method_zlib_decomp: handle Z_BUF_ERROR when inflating
Return LIBSSH2_ERROR_SOCKET_DISCONNECT on EOF when reading banner
userauth.c: fread() from public key file to correctly detect any errors
configure.ac: Add option to disable build of the example applications
Added 'Requires.private:' line to libssh2.pc
SFTP: filter off incoming "zombie" responses
gettimeofday: no need for a replacement under cygwin
SSH_MSG_CHANNEL_REQUEST: default to want_reply
win32/libssh2_config.h: Remove hardcoded #define LIBSSH2_HAVE_ZLIB
build error with gcrypt backend
always do "forced" window updates to avoid corner case stalls
aes: the init function fails when OpenSSL has AES support
transport_send: Finish in-progress key exchange before sending data
channel_write: acknowledge transport errors
examples/x11.c: Make sure sizeof passed to read operation is correct
examples/x11.c:,Fix suspicious sizeof usage
sftp_packet_add: verify the packet before accepting it
SFTP: preserve the original error code more
sftp_packet_read: adjust window size as necessary
Use safer snprintf rather then sprintf in several places
Define and use LIBSSH2_INVALID_SOCKET instead of INVALID_SOCKET
sftp_write: cannot return acked data *and* EAGAIN
sftp_read: avoid data *and* EAGAIN
libssh2.h: Add missing prototype for libssh2_session_banner_set()
- dropped patches (already in the upstream)
0004-libssh2.h-Add-missing-prototype-for-libssh2_session_.patch
0005-Add-symbol-versioning.patch
0006-missing-libssh2_session_banner_set.patch
-------------------------------------------------------------------
Thu Feb 2 13:36:17 UTC 2012 - crrodriguez@opensuse.org
- fix license
-------------------------------------------------------------------
Thu Feb 2 04:27:50 UTC 2012 - crrodriguez@opensuse.org
- Update to version 1.4.0 plus git bugfixes
-------------------------------------------------------------------
Tue Dec 27 03:41:32 UTC 2011 - crrodriguez@opensuse.org
- Refresh patches.
-------------------------------------------------------------------
Thu Dec 1 03:41:02 UTC 2011 - jengelh@medozas.de
- Remove redundant/unwanted tags/section (cf. specfile guidelines)
-------------------------------------------------------------------
Thu Dec 1 02:43:46 UTC 2011 - crrodriguez@opensuse.org
- open library file descriptors with O_CLOEXEC
-------------------------------------------------------------------
Fri Oct 21 18:15:49 UTC 2011 - crrodriguez@opensuse.org
- Update to version 1.3.0
* sftp_read: advance offset correctly for buffered copies
* libssh2_sftp_seek64: flush packetlist and buffered data
* _libssh2_packet_add: adjust window size when truncating
* sftp_read: a short read is not end of file
-------------------------------------------------------------------
Sat Oct 1 14:19:34 CEST 2011 - dmueller@suse.de
- document the reason for the testsuite failure
-------------------------------------------------------------------
Fri Sep 30 17:36:36 UTC 2011 - crrodriguez@opensuse.org
- Workaround qemu-arm problems.
-------------------------------------------------------------------
Tue Sep 6 04:42:00 UTC 2011 - crrodriguez@opensuse.org
- respect user's openssl.cnf engine configuration, might
want to do crypto with aes-ni, intel-accell or use rdrand
-------------------------------------------------------------------
Wed Aug 17 21:08:57 UTC 2011 - crrodriguez@opensuse.org
- Update to version 1.2.9
* Added libssh2_session_set_timeout() and
libssh2_session_get_timeout() to make blocking calls get a timeout
* userauth_keyboard_interactive: fix buffer overflow
-------------------------------------------------------------------
Fri Oct 29 17:09:09 UTC 2010 - cristian.rodriguez@opensuse.org
- Update 1.2.7
- Better handling of invalid key files
- inputchecks: make lots of API functions check for NULL pointers
- libssh2_session_callback_set: extended the man page
- SFTP: limit write() to not produce overly large packets
- agent: make libssh2_agent_userauth() work blocking properly
- _libssh2_userauth_publickey: reject method names longer than the data
- channel_free: ignore problems with channel_close()
- typedef: make ssize_t get typedef without LIBSSH2_WIN32
- _libssh2_wait_socket: poll needs milliseconds
- libssh2_wait_socket: reset error code to "leak" EAGAIN less
- Added include for sys/select.h to get fd.set on some platforms
- session_free: free more data to avoid memory leaks
- openssl: make use of the EVP interface
- Fix underscore typo for 64-bit printf format specifiers on Windows
- Make libssh2_debug() create a correctly terminated string
- userauth_hostbased_fromfile: packet length too short
- handshake: Compression enabled at the wrong time
- Don't overflow MD5 server hostkey-
-------------------------------------------------------------------
Sun Aug 8 14:28:00 UTC 2010 - cristian.rodriguez@opensuse.org
- restore %build section, accidentally removed
-------------------------------------------------------------------
Mon Aug 2 15:57:25 UTC 2010 - cristian.rodriguez@opensuse.org
- update to libssh2 1.2.6
* Added libssh2_sftp_statvfs() and libssh2_sftp_fstatvfs()
* Added libssh2_knownhost_checkp()
* Added libssh2_scp_send64()
* fail to init SFTP if session isn't already authenticated
* sftp_close_handle: add precaution to not access NULL pointer
* channel_write: if data has been sent, don't return EAGAIN
-------------------------------------------------------------------
Tue Apr 6 21:51:55 UTC 2010 - crrodriguez@opensuse.org
- fix build in older products
-------------------------------------------------------------------
Mon Feb 22 22:00:37 UTC 2010 - crrodriguez@opensuse.org
- update to version 1.2.4
-------------------------------------------------------------------
Mon Feb 1 11:55:42 UTC 2010 - jengelh@medozas.de
- package baselibs.conf
-------------------------------------------------------------------
Sat Nov 28 17:08:10 UTC 2009 - crrodriguez@opensuse.org
- Update snapshot
-------------------------------------------------------------------
Wed Sep 30 18:35:43 UTC 2009 - crrodriguez@opensuse.org
- add visbility support
-------------------------------------------------------------------
Wed Sep 30 12:45:41 UTC 2009 - crrodriguez@opensuse.org
- update to version 1.2.1 see NEWS for details
-------------------------------------------------------------------
Tue Aug 11 00:00:43 CEST 2009 - crrodriguez@suse.de
- update to version 1.2 see NEWS for details
-------------------------------------------------------------------
Wed May 27 15:13:42 CEST 2009 - crrodriguez@suse.de
- do not provide or obsolete libssh2 [bnc#507444]
-------------------------------------------------------------------
Sun May 10 00:20:54 CEST 2009 - crrodriguez@suse.de
- update to version 1.1, see NEWS for details
-------------------------------------------------------------------
Mon Jan 5 21:19:43 CET 2009 - crrodriguez@suse.de
- update to version 1.0, see large list of changes in the NEWS file
-------------------------------------------------------------------
Tue Oct 14 21:35:02 CEST 2008 - crrodriguez@suse.de
- rename package to avoid all sorts of conflicts with the other
"libssh" package
-------------------------------------------------------------------
Thu Aug 14 06:20:14 CEST 2008 - crrodriguez@suse.de
- update current snap , version 20080814
* Sean Peterson fixed a key re-exchange bug:
http://daniel.haxx.se/projects/libssh2/mail/libssh2-devel-archive-2008-06/0002.shtml
-------------------------------------------------------------------
Thu Jun 26 04:53:36 CEST 2008 - crrodriguez@suse.de
- update to version 0.19.0-20080626, two bugfixes
-------------------------------------------------------------------
Mon Jun 23 20:47:59 CEST 2008 - crrodriguez@suse.de
- no longer needs fno-strict-aliasing
-------------------------------------------------------------------
Mon Jun 23 02:11:56 CEST 2008 - crrodriguez@suse.de
- update to libssh2-0.19.0-20080622
-------------------------------------------------------------------
Sun Dec 23 07:22:12 CET 2007 - crrodriguez@suse.de
- update to 0.18 final
-------------------------------------------------------------------
Fri Aug 31 23:12:41 CEST 2007 - crrodriguez@suse.de
- update snap
-------------------------------------------------------------------
Sat Apr 14 03:41:03 UTC 2007 - judas_iscariote@shorewall.net
- update snapshot.