libssh2-1-1.4.3-19.9.1<>,8O] Ȁ/=„0x+zgo_(T5]uu˭{0oP*{گ]s36` yB"9=#7e\Sx>dhi.gę"q&K soKk"xayV %w7~#Izucļ6z \ --7hsX##&+~l&''N=sĥ7C['{U2Tz͟ɐPT3Fs}]T^b/><)?)d   B $7@M f      8@t   ( 8#9#:!#>&4@&CF&RG&dH&lI&tX&xY&\&]&^&b&c'td( e(f(l(u((v(0w(x(y( z(Clibssh2-11.4.319.9.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.] Ȁlamb53 openSUSE Leap 42.3openSUSEBSD-3-Clausehttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://www.libssh2.org/linuxx86_64 ] q] q5c167b4f8e9ed127af77e429aa442628libssh2.so.1.0.1rootrootrootrootlibssh2_org-1.4.3-19.9.1.src.rpmlibssh2-1libssh2-1(x86-64)libssh2.so.1()(64bit)@@@@@@@@   /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libcrypto.so.1.0.0()(64bit)libz.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2\t@\\\MWVIV@UT@Q4Qw@Q/FP @O*zO*zN@Nl@Nl@N^NN@Nf @NK@Lʷ@L^@LV@K"@KqKf@KJH@JH@J J+@Jp@Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez pjanouch@suse.devcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.commvyskocil@suse.comboris@steki.netcrrodriguez@opensuse.orgvcizek@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgjengelh@medozas.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgdmueller@suse.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgjengelh@medozas.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.de- Fix upstream patch for CVE-2019-3860 [bsc#1136570, bsc#1128481] * Added libssh2_org-CVE-2019-3860-fix.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Store but don't use keys of unsupported types in the known_hosts file [bsc#1091236] * Added libssh2_org-knownhosts-handle-unknown-key-types.patch- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- add bsc974691.patch (bsc#974691) - fix 0001-kex-Added-diffie-hellman-group-exchange-sha256-suppo.patch (as per CVE-2016-0787)- add SHA256 support for DH group exchange (fate#320343, bsc#961964) * add patches: 0001-Add-support-for-HMAC-SHA-256-and-HMAC-SHA-512.patch 0001-kex-Added-diffie-hellman-group-exchange-sha256-suppo.patch- fix CVE-2016-0787 (bsc#967026) * Weakness in diffie-hellman secret key generation * add CVE-2016-0787.patch- properly detect EVP_aes_128_ctr at configure time (bsc#933336) * added libssh2-configure_detect_aes_ctr.patch- fix for CVE-2015-1782 (bnc#921070) * unbounded read when negotiating a new session * added CVE-2015-1782.patch- ignore groff-full to remove factory build cycle - add groff to build requires to make tests passing- fix building on older kernels and older OS / SLE- Use AC_CONFIG_HEADERS instead of AM_CONFIG_HEADER, fixes build with new automake- update to 1.4.3 compression: add support for zlib@openssh.com Bug fixes: sftp_read: return error if a too large package arrives libssh2_hostkey_hash.3: update the description of return value examples: use stderr for messages, stdout for data openssl: do not leak memory when handling errors improved handling of disabled MD5 algorithm in OpenSSL known_hosts: Fail when parsing unknown keys in known_hosts file configure: gcrypt doesn't come with pkg-config support session_free: wrong variable used for keeping state libssh2_userauth_publickey_fromfile_ex.3: mention publickey == NULL comp_method_zlib_decomp: handle Z_BUF_ERROR when inflating Return LIBSSH2_ERROR_SOCKET_DISCONNECT on EOF when reading banner userauth.c: fread() from public key file to correctly detect any errors configure.ac: Add option to disable build of the example applications Added 'Requires.private:' line to libssh2.pc SFTP: filter off incoming "zombie" responses gettimeofday: no need for a replacement under cygwin SSH_MSG_CHANNEL_REQUEST: default to want_reply win32/libssh2_config.h: Remove hardcoded #define LIBSSH2_HAVE_ZLIB build error with gcrypt backend always do "forced" window updates to avoid corner case stalls aes: the init function fails when OpenSSL has AES support transport_send: Finish in-progress key exchange before sending data channel_write: acknowledge transport errors examples/x11.c: Make sure sizeof passed to read operation is correct examples/x11.c:,Fix suspicious sizeof usage sftp_packet_add: verify the packet before accepting it SFTP: preserve the original error code more sftp_packet_read: adjust window size as necessary Use safer snprintf rather then sprintf in several places Define and use LIBSSH2_INVALID_SOCKET instead of INVALID_SOCKET sftp_write: cannot return acked data *and* EAGAIN sftp_read: avoid data *and* EAGAIN libssh2.h: Add missing prototype for libssh2_session_banner_set() - dropped patches (already in the upstream) 0004-libssh2.h-Add-missing-prototype-for-libssh2_session_.patch 0005-Add-symbol-versioning.patch 0006-missing-libssh2_session_banner_set.patch- fix license- Update to version 1.4.0 plus git bugfixes- Refresh patches.- Remove redundant/unwanted tags/section (cf. specfile guidelines)- open library file descriptors with O_CLOEXEC- Update to version 1.3.0 * sftp_read: advance offset correctly for buffered copies * libssh2_sftp_seek64: flush packetlist and buffered data * _libssh2_packet_add: adjust window size when truncating * sftp_read: a short read is not end of file- document the reason for the testsuite failure- Workaround qemu-arm problems.- respect user's openssl.cnf engine configuration, might want to do crypto with aes-ni, intel-accell or use rdrand- Update to version 1.2.9 * Added libssh2_session_set_timeout() and libssh2_session_get_timeout() to make blocking calls get a timeout * userauth_keyboard_interactive: fix buffer overflow- Update 1.2.7 - Better handling of invalid key files - inputchecks: make lots of API functions check for NULL pointers - libssh2_session_callback_set: extended the man page - SFTP: limit write() to not produce overly large packets - agent: make libssh2_agent_userauth() work blocking properly - _libssh2_userauth_publickey: reject method names longer than the data - channel_free: ignore problems with channel_close() - typedef: make ssize_t get typedef without LIBSSH2_WIN32 - _libssh2_wait_socket: poll needs milliseconds - libssh2_wait_socket: reset error code to "leak" EAGAIN less - Added include for sys/select.h to get fd.set on some platforms - session_free: free more data to avoid memory leaks - openssl: make use of the EVP interface - Fix underscore typo for 64-bit printf format specifiers on Windows - Make libssh2_debug() create a correctly terminated string - userauth_hostbased_fromfile: packet length too short - handshake: Compression enabled at the wrong time - Don't overflow MD5 server hostkey-- restore %build section, accidentally removed- update to libssh2 1.2.6 * Added libssh2_sftp_statvfs() and libssh2_sftp_fstatvfs() * Added libssh2_knownhost_checkp() * Added libssh2_scp_send64() * fail to init SFTP if session isn't already authenticated * sftp_close_handle: add precaution to not access NULL pointer * channel_write: if data has been sent, don't return EAGAIN- fix build in older products- update to version 1.2.4- package baselibs.conf- Update snapshot- add visbility support- update to version 1.2.1 see NEWS for details- update to version 1.2 see NEWS for details- do not provide or obsolete libssh2 [bnc#507444]- update to version 1.1, see NEWS for details/sbin/ldconfig/sbin/ldconfiglamb53 15611188481.4.3-19.9.11.4.3-19.9.1libssh2.so.1libssh2.so.1.0.1/usr/lib64/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10479/openSUSE_Leap_42.3_Update/c1d6925002c4e58ab0839a0899d557bd-libssh2_org.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=0948a51b6c7ffe4ab0f61be73ee1ea6bec59634b, stripped PRRRRRRR RaƸŔ?@]"k%f0]d涻eO;;8j9m&%|@\Җ!|]v5&{ϰz*|,L^P2}pqVj/ِe습\cz#|J{֙nBRM9V|̶Kn4.N_~ ?KS)Uy|C0?|ō"J1et}}Vڇws\^xY?|FAV`e8,#sۢ ]0m ;WCot5 #:BJS?Q' LaIy}E5WuNq"ժ,^;=4" AA E"h& <^hȉ+xM^:|yJj Uv #B2,.MGЄOvTӐFᢔKYmw⦤3RףdA-#KU+1'eq {n`wN_ 7SȒL0sk}38y_ĉ ]$,x.ܬ轟eCgʳײݔqp"hxbFgjc#1,&輽.UW _-/V f'Ӊ! = Jy<m_T~=Hbgo^!Jao*X 9O0Ojq |;Hөh60,%p!#ihkY^bˋ}K!Lg ^ :e. X&9cہM%Rk??A=XH8 T0/B: ೃ ]MvӝZ1.i͑3{?ց7+Hg)610,㼶G?m4S2TgNVhtЪ;#J$cxQuaam .ޒ'J~ӇջRws|r07d*pk+dS'(dq7_[2!5["@f D;d@¨լz-3犆z En TZX)^ !N%'7:`[!ܨњ5K[Ś$Xlqt:h%ߕq"DM @'ՕƓY}C1Ž6m*-~u{IJ!ع?:Bl&_-9eFıuvPN/21lhptCR7*8ܑ |2<۞\dС[K?-7%y=wї05Xk!\\ױgvnu]KhQ6*#neck*Twt#%g'&3G6VM&'.+W*58걧Kos '&lMk0;s7(8/w/PEtaQp SN0 Fr/ B`ÆnF7saq+p/y?׮bG W%tLc7Su 'BJ'ׇBE28$bh906׳=SQraE)Sӟ֜lxEpN]+&KA/ {rf{^i8gFPpY/lw2feҗ^5GUgUÅ3䕬n}FO=# \6Uwru^`d;jkYAȵ"5phSOţ&e.^>`b0Y[&Vh,Yjkk@eǧ!*J^$*x!̀34?_d ϰlJ/u no-eX+SU@vMtquY8F8 B~8MsU