libssh2-1-32bit-1.4.3-19.9.1<>,?] Q/=„Qy:hH07_RD|>XEG,CzFQi!^n}!#O ¬ͦ Jݘ"'C6SeaX!ȂK.FT(H:Z?r$zp_D52ka7@c9LS|7Lw=QuyGPQ\S*[ۘԆc{[ OE Mɯ}$Z>GsP i]zi@3&LFÚD#^1V&@f}:>CYEǮ=]֫h O3>=)?(d  H$(;DQ j      (LT   (8#9#:#>&B& G&0H&8I&@X&DY&TZ&x[&|\&]&^&b&c'kd(e(f( l( u( v((w(x(y( Clibssh2-1-32bit1.4.319.9.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.] Qbuild81lopenSUSE Leap 42.3openSUSEBSD-3-Clausehttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://www.libssh2.org/linuxx86_64/sbin/ldconfigl] Q] Q2c9e6c13fc0e85f8d5f6d6f906e3c161libssh2.so.1.0.1rootrootrootrootlibssh2_org-1.4.3-19.9.1.src.rpmlibssh2-1-32bitlibssh2-1-32bit(x86-32)libssh2-32bitlibssh2.so.1@@@@@@@@@   /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libcrypto.so.1.0.0libz.so.1rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2\t@\\\MWVIV@UT@Q4Qw@Q/FP @O*zO*zN@Nl@Nl@N^NN@Nf @NK@Lʷ@L^@LV@K"@KqKf@KJH@JH@J J+@Jp@Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez pjanouch@suse.devcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.commvyskocil@suse.comboris@steki.netcrrodriguez@opensuse.orgvcizek@suse.comcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgjengelh@medozas.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgdmueller@suse.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcristian.rodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgjengelh@medozas.decrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@opensuse.orgcrrodriguez@suse.decrrodriguez@suse.decrrodriguez@suse.de- Fix upstream patch for CVE-2019-3860 [bsc#1136570, bsc#1128481] * Added libssh2_org-CVE-2019-3860-fix.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Store but don't use keys of unsupported types in the known_hosts file [bsc#1091236] * Added libssh2_org-knownhosts-handle-unknown-key-types.patch- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- add bsc974691.patch (bsc#974691) - fix 0001-kex-Added-diffie-hellman-group-exchange-sha256-suppo.patch (as per CVE-2016-0787)- add SHA256 support for DH group exchange (fate#320343, bsc#961964) * add patches: 0001-Add-support-for-HMAC-SHA-256-and-HMAC-SHA-512.patch 0001-kex-Added-diffie-hellman-group-exchange-sha256-suppo.patch- fix CVE-2016-0787 (bsc#967026) * Weakness in diffie-hellman secret key generation * add CVE-2016-0787.patch- properly detect EVP_aes_128_ctr at configure time (bsc#933336) * added libssh2-configure_detect_aes_ctr.patch- fix for CVE-2015-1782 (bnc#921070) * unbounded read when negotiating a new session * added CVE-2015-1782.patch- ignore groff-full to remove factory build cycle - add groff to build requires to make tests passing- fix building on older kernels and older OS / SLE- Use AC_CONFIG_HEADERS instead of AM_CONFIG_HEADER, fixes build with new automake- update to 1.4.3 compression: add support for zlib@openssh.com Bug fixes: sftp_read: return error if a too large package arrives libssh2_hostkey_hash.3: update the description of return value examples: use stderr for messages, stdout for data openssl: do not leak memory when handling errors improved handling of disabled MD5 algorithm in OpenSSL known_hosts: Fail when parsing unknown keys in known_hosts file configure: gcrypt doesn't come with pkg-config support session_free: wrong variable used for keeping state libssh2_userauth_publickey_fromfile_ex.3: mention publickey == NULL comp_method_zlib_decomp: handle Z_BUF_ERROR when inflating Return LIBSSH2_ERROR_SOCKET_DISCONNECT on EOF when reading banner userauth.c: fread() from public key file to correctly detect any errors configure.ac: Add option to disable build of the example applications Added 'Requires.private:' line to libssh2.pc SFTP: filter off incoming "zombie" responses gettimeofday: no need for a replacement under cygwin SSH_MSG_CHANNEL_REQUEST: default to want_reply win32/libssh2_config.h: Remove hardcoded #define LIBSSH2_HAVE_ZLIB build error with gcrypt backend always do "forced" window updates to avoid corner case stalls aes: the init function fails when OpenSSL has AES support transport_send: Finish in-progress key exchange before sending data channel_write: acknowledge transport errors examples/x11.c: Make sure sizeof passed to read operation is correct examples/x11.c:,Fix suspicious sizeof usage sftp_packet_add: verify the packet before accepting it SFTP: preserve the original error code more sftp_packet_read: adjust window size as necessary Use safer snprintf rather then sprintf in several places Define and use LIBSSH2_INVALID_SOCKET instead of INVALID_SOCKET sftp_write: cannot return acked data *and* EAGAIN sftp_read: avoid data *and* EAGAIN libssh2.h: Add missing prototype for libssh2_session_banner_set() - dropped patches (already in the upstream) 0004-libssh2.h-Add-missing-prototype-for-libssh2_session_.patch 0005-Add-symbol-versioning.patch 0006-missing-libssh2_session_banner_set.patch- fix license- Update to version 1.4.0 plus git bugfixes- Refresh patches.- Remove redundant/unwanted tags/section (cf. specfile guidelines)- open library file descriptors with O_CLOEXEC- Update to version 1.3.0 * sftp_read: advance offset correctly for buffered copies * libssh2_sftp_seek64: flush packetlist and buffered data * _libssh2_packet_add: adjust window size when truncating * sftp_read: a short read is not end of file- document the reason for the testsuite failure- Workaround qemu-arm problems.- respect user's openssl.cnf engine configuration, might want to do crypto with aes-ni, intel-accell or use rdrand- Update to version 1.2.9 * Added libssh2_session_set_timeout() and libssh2_session_get_timeout() to make blocking calls get a timeout * userauth_keyboard_interactive: fix buffer overflow- Update 1.2.7 - Better handling of invalid key files - inputchecks: make lots of API functions check for NULL pointers - libssh2_session_callback_set: extended the man page - SFTP: limit write() to not produce overly large packets - agent: make libssh2_agent_userauth() work blocking properly - _libssh2_userauth_publickey: reject method names longer than the data - channel_free: ignore problems with channel_close() - typedef: make ssize_t get typedef without LIBSSH2_WIN32 - _libssh2_wait_socket: poll needs milliseconds - libssh2_wait_socket: reset error code to "leak" EAGAIN less - Added include for sys/select.h to get fd.set on some platforms - session_free: free more data to avoid memory leaks - openssl: make use of the EVP interface - Fix underscore typo for 64-bit printf format specifiers on Windows - Make libssh2_debug() create a correctly terminated string - userauth_hostbased_fromfile: packet length too short - handshake: Compression enabled at the wrong time - Don't overflow MD5 server hostkey-- restore %build section, accidentally removed- update to libssh2 1.2.6 * Added libssh2_sftp_statvfs() and libssh2_sftp_fstatvfs() * Added libssh2_knownhost_checkp() * Added libssh2_scp_send64() * fail to init SFTP if session isn't already authenticated * sftp_close_handle: add precaution to not access NULL pointer * channel_write: if data has been sent, don't return EAGAIN- fix build in older products- update to version 1.2.4- package baselibs.conf- Update snapshot- add visbility support- update to version 1.2.1 see NEWS for details- update to version 1.2 see NEWS for details- do not provide or obsolete libssh2 [bnc#507444]- update to version 1.1, see NEWS for details/bin/shlibssh2-32bit1.4.3-19.9.11.4.3-19.9.11.4.3 1.4.3libssh2.so.1libssh2.so.1.0.1/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:10479/openSUSE_Leap_42.3_Update/c1d6925002c4e58ab0839a0899d557bd-libssh2_org.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=14f72b83d32d3f61a5633fae366868a0e9aeee92, stripped PRRRRRRRR R?0]"k%d涻eiW=׋v/ j4\3wk^'3bIsigcA׭~yWcPT B@W(rׂӈ\lORNJXT@W {k7Iw%n .RYΗVS5e&<SHZn[xzĆ C 7lgTx %gBRxɒF6~  Ec#z66l]-8X[ N!  O5 ۖ"ЫIs Jkq@|IqkɊkEYwb 6؜eeb??*>R^R  CbGFV=5ȣ/5[A5~eZWU&~c(>fǯ{KX՚15NNƿqK=3`jl{k4 otߪO٪{$*D즄Y5Y*,Gyq[M-:%ΰÑNa8lp iҬȭEk[Jڟ d %'@\.2d6}$(ZI]k?ʶJ,?4l:Qwq3HI UIWIA>$$մ+Eo^ Y.5-o-d.oV"a IqZ=1AyHjYJZ֚I͟>(c6_vhӋM&< ^Tsڛ6F1Ȩ l9ԅ$"F]sъp!cqiLm15瞏콇Ć;l(d BK]Ĥ4_PIӂ47\䫁-Gag7iԛFaR%Lb%$^sq"oPGXr(|}YʯAr!,L2z_Op,:lyxU%".N.]jNE*>$-F`QJ䞐t?̂+ݗ!7] 22+,f6ٺY#-jZRI K7 eⶂ˦np_K*X`DS6N?,t^NCBYy\c:]ziq}ag}"S*+DW`+/NαV"K~֕0N9)o͜#TK$=A2CYAamDFVݰ@}pɨׯ= HC@AR#5H"5$I?_^}ΑZ/|~&x Z>))fXs!m όRzkSTۗH{=6=~_mvT]>m0aޅ$:;q>-ˀ7%R]=Ԓr%wSDOlr/޻i.1NL\fzV|v}!2RYkQP%eW b'i6v9#$/:)[jnjB i#XDy™H&dE'2޸ǕyyKYTőZisMbM^ MPh.{t0Qk{xU?tҐ:G'D$teMɈ{eAр;[ARkvH&؂Wa.`=M&0ðlٝˡsrNeoNǬт@x-t MP;;f8.^K&mm7͚|ʅ# U' 3n0D s5g" \# <[ѩ?OS1YD)*Ó9KbMqMd]@$_~zwo ̃~B.QϹt1s)HޕܾP6C:4E)?th}RbY)E܁Y%~*M%;?m'qˢeoaGa_3 玳m ޜ܂d%V6nA[kyi t*9!q#|2V8X?Nע CpuJ.! :-v|tQL">PYIʠ(M& Q0~r7g8B`֬NOa@K=`>R {=Sl!׉߁b{,;=' Vdlz-2I}H}] ?[Dj+pqO@S aPt /hwUq$(1m FxwT8Wy%C[lq{UC"`~KMAgd.ǻAqE0tg dIcMG|2*FrTэzp' FWY86VWmB[:pJaAOL,ﭼŁ^'$".mxQFݝ L 'Xcne'&iHiWnѯ](LW 3L~d}9PEYb<1WSM%=E;H'JhX#@ {9)a߅L5]Ǐ[3Y?`MGoNm\Ur[#)3manra*UUE8y$ 5>s3%HLD3L5bgRF+G&߿ڿHkk2MRP$ss|LO9,H AO3E@ל"ᕃN>3UY̴|MOwɓEsژ4y7{JURvSp#b 1ʈj9@DUAnBYAΞJ4I`#w4>} wqu]jVz~=3L1n 1v23AŗH d3R &4J}ct١{H~:awr<V:ѻU8O78f^_H0I#eҢ|ʆ=dz6WK4p\fF:I<:/qI=.3հZr# PEP,&`MkS56{Lӑa;Tsw`'U.Sy6)YT >%TGz6: D1?