Name: | libssh2 |
---|---|
Version: | 1.10.0 |
Release: | 1.el8 |
Architecture: | aarch64 |
Group: | Unspecified |
Size: | 276182 |
License: | BSD |
RPM: | libssh2-1.10.0-1.el8.aarch64.rpm |
Source RPM: | libssh2-1.10.0-1.el8.src.rpm |
Build Date: | Wed Sep 13 2023 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | https://www.libssh2.org/ |
Summary: | A library implementing the SSH2 protocol |
Description: | libssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS(22), SECSH-USERAUTH(25), SECSH-CONNECTION(23), SECSH-ARCH(20), SECSH-FILEXFER(06)*, SECSH-DHGEX(04), and SECSH-NUMBERS(10). |
- Update to 1.10.0 - Adds agent forwarding support - Adds OpenSSH Agent support on Windows - Adds ECDSA key support using the Mbed TLS backend - Adds ECDSA cert authentication - Adds diffie-hellman-group14-sha256, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512 key exchanges - Adds support for PKIX key reading when using ed25519 with OpenSSL - Adds support for EWOULDBLOCK on VMS systems - Adds support for building with OpenSSL 3 - Adds support for using FIPS mode in OpenSSL - Adds debug symbols when building with MSVC - Adds support for building on the 3DS - Adds unicode build support on Windows - Restores os400 building - Increases min, max and opt Diffie Hellman group values - Improves portability of the make file - Improves timeout behaviour with 2FA keyboard auth - Various improvements to the Wincng backend - Fixes reading partial packet replies when using an agent - Fixes Diffie Hellman key exchange on Windows 1903+ builds - Fixes building tests with older versions of OpenSSL - Fixes possible multiple definition warnings - Fixes potential cast issues _libssh2_ecdsa_key_get_curve_type() - Fixes potential use after free if libssh2_init() is called twice - Improved linking when using Mbed TLS - Fixes call to libssh2_crypto_exit() if crypto hasn't been initialized - Fixes crash when loading public keys with no id - Fixes possible out of bounds read when exchanging keys - Fixes possible out of bounds read when reading packets - Fixes possible out of bounds read when opening an X11 connection - Fixes possible out of bounds read when ecdh host keys - Fixes possible hang when trying to read a disconnected socket - Fixes a crash when using the delayed compression option - Fixes read error with large known host entries - Fixes various warnings - Fixes various small memory leaks - Improved error handling, various detailed errors will now be reported - Builds are now using OSS-Fuzz - Builds now use autoreconf instead of a custom build script - cmake now respects install directory - Improved CI backend - Updated HACKING-CRYPTO documentation - Use markdown file extensions - Improved unit tests
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
- Switch to https:// upstream URLs - Full groff (not just groff-base) needed for the mansyntax check
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
- Fix integer overflow in SSH_MSG_DISCONNECT logic (CVE-2019-17498)
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
- Update to 1.9.0 - Fixed integer overflow leading to out-of-bounds read (CVE-2019-13115) - Adds ECDSA keys and host key support when using OpenSSL - Adds ED25519 key and host key support when using OpenSSL 1.1.1 - Adds OpenSSH style key file reading - Adds AES CTR mode support when using WinCNG - Adds PEM passphrase protected file support for libgcrypt and WinCNG - Adds SHA256 hostkey fingerprint - Adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path() - Adds explicit zeroing of sensitive data in memory - Adds additional bounds checks to network buffer reads - Adds the ability to use the server default permissions when creating sftp directories - Adds support for building with OpenSSL no engine flag - Adds support for building with LibreSSL - Increased sftp packet size to 256k - Fixed oversized packet handling in sftp - Fixed building with OpenSSL 1.1 - Fixed a possible crash if sftp stat gets an unexpected response - Fixed incorrect parsing of the KEX preference string value - Fixed conditional RSA and AES-CTR support - Fixed a small memory leak during the key exchange process - Fixed a possible memory leak of the ssh banner string - Fixed various small memory leaks in the backends - Fixed possible out of bounds read when parsing public keys from the server - Fixed possible out of bounds read when parsing invalid PEM files - No longer null terminates the scp remote exec command - Now handle errors when Diffie Hellman key pair generation fails - Fixed compiling on Windows with the flag STDCALL=ON - Improved building instructions - Improved unit tests - Needs OpenSSL ≥ 1.0.1 now as ECC support is assumed - Modernize spec somewhat as EL-6 can no longer be supported
- Update to 1.8.2 - Fixed the misapplied userauth patch that broke 1.8.1 - Moved the MAX size declarations from the public header