import libssh-0.9.6-3.el8
This commit is contained in:
		
							parent
							
								
									6442aaae0e
								
							
						
					
					
						commit
						7edbb16055
					
				
							
								
								
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.gitignore
									
									
									
									
										vendored
									
									
								
							| @ -1,2 +1,2 @@ | |||||||
| SOURCES/libssh-0.9.4.tar.xz | SOURCES/libssh-0.9.6.tar.xz | ||||||
| SOURCES/libssh.keyring | SOURCES/libssh.keyring | ||||||
|  | |||||||
| @ -1,2 +1,2 @@ | |||||||
| 93289b77379263328c843fa85ba5ed4b274b689f SOURCES/libssh-0.9.4.tar.xz | 1b2dd673b58e1eaf20fde45cd8de2197cfab2f78 SOURCES/libssh-0.9.6.tar.xz | ||||||
| 3f2ab0bca02893402ba0ad172a6bd44456a65f86 SOURCES/libssh.keyring | 3f2ab0bca02893402ba0ad172a6bd44456a65f86 SOURCES/libssh.keyring | ||||||
|  | |||||||
| @ -1,125 +0,0 @@ | |||||||
| From 1694606e12d8950b003ff86248883732ef05e00c Mon Sep 17 00:00:00 2001 |  | ||||||
| From: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> |  | ||||||
| Date: Fri, 19 Jun 2020 11:59:33 +0200 |  | ||||||
| Subject: [PATCH] tests: Add test for CVE-2019-14889 |  | ||||||
| 
 |  | ||||||
| The test checks if a command appended to the file path is not executed. |  | ||||||
| 
 |  | ||||||
| Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> |  | ||||||
| Reviewed-by: Andreas Schneider <asn@cryptomilk.org> |  | ||||||
| ---
 |  | ||||||
|  tests/client/torture_scp.c | 84 ++++++++++++++++++++++++++++++++++++++ |  | ||||||
|  1 file changed, 84 insertions(+) |  | ||||||
| 
 |  | ||||||
| diff --git a/tests/client/torture_scp.c b/tests/client/torture_scp.c
 |  | ||||||
| index 8f080af3..59a00bae 100644
 |  | ||||||
| --- a/tests/client/torture_scp.c
 |  | ||||||
| +++ b/tests/client/torture_scp.c
 |  | ||||||
| @@ -37,6 +37,7 @@
 |  | ||||||
|  #define BUF_SIZE 1024 |  | ||||||
|   |  | ||||||
|  #define TEMPLATE BINARYDIR "/tests/home/alice/temp_dir_XXXXXX" |  | ||||||
| +#define ALICE_HOME BINARYDIR "/tests/home/alice"
 |  | ||||||
|   |  | ||||||
|  struct scp_st { |  | ||||||
|      struct torture_state *s; |  | ||||||
| @@ -540,6 +541,86 @@ static void torture_scp_upload_newline(void **state)
 |  | ||||||
|      fclose(file); |  | ||||||
|  } |  | ||||||
|   |  | ||||||
| +static void torture_scp_upload_appended_command(void **state)
 |  | ||||||
| +{
 |  | ||||||
| +    struct scp_st *ts = NULL;
 |  | ||||||
| +    struct torture_state *s = NULL;
 |  | ||||||
| +
 |  | ||||||
| +    ssh_session session = NULL;
 |  | ||||||
| +    ssh_scp scp = NULL;
 |  | ||||||
| +
 |  | ||||||
| +    FILE *file = NULL;
 |  | ||||||
| +
 |  | ||||||
| +    char buf[1024];
 |  | ||||||
| +    char *rs = NULL;
 |  | ||||||
| +    int rc;
 |  | ||||||
| +
 |  | ||||||
| +    assert_non_null(state);
 |  | ||||||
| +    ts = *state;
 |  | ||||||
| +
 |  | ||||||
| +    assert_non_null(ts->s);
 |  | ||||||
| +    s = ts->s;
 |  | ||||||
| +
 |  | ||||||
| +    session = s->ssh.session;
 |  | ||||||
| +    assert_non_null(session);
 |  | ||||||
| +
 |  | ||||||
| +    assert_non_null(ts->tmp_dir_basename);
 |  | ||||||
| +    assert_non_null(ts->tmp_dir);
 |  | ||||||
| +
 |  | ||||||
| +    /* Upload a file path with a command appended */
 |  | ||||||
| +
 |  | ||||||
| +    /* Append a command to the file path */
 |  | ||||||
| +    snprintf(buf, BUF_SIZE, "%s"
 |  | ||||||
| +             "/;touch hack",
 |  | ||||||
| +             ts->tmp_dir);
 |  | ||||||
| +
 |  | ||||||
| +    /* When writing the file_name must be the directory name */
 |  | ||||||
| +    scp = ssh_scp_new(session, SSH_SCP_WRITE | SSH_SCP_RECURSIVE,
 |  | ||||||
| +                      buf);
 |  | ||||||
| +    assert_non_null(scp);
 |  | ||||||
| +
 |  | ||||||
| +    rc = ssh_scp_init(scp);
 |  | ||||||
| +    assert_ssh_return_code(session, rc);
 |  | ||||||
| +
 |  | ||||||
| +    /* Push directory where the new file will be copied */
 |  | ||||||
| +    rc = ssh_scp_push_directory(scp, ";touch hack", 0755);
 |  | ||||||
| +    assert_ssh_return_code(session, rc);
 |  | ||||||
| +
 |  | ||||||
| +    /* Try to push file */
 |  | ||||||
| +    rc = ssh_scp_push_file(scp, "original", 8, 0644);
 |  | ||||||
| +    assert_ssh_return_code(session, rc);
 |  | ||||||
| +
 |  | ||||||
| +    rc = ssh_scp_write(scp, "original", 8);
 |  | ||||||
| +    assert_ssh_return_code(session, rc);
 |  | ||||||
| +
 |  | ||||||
| +    /* Leave the directory */
 |  | ||||||
| +    rc = ssh_scp_leave_directory(scp);
 |  | ||||||
| +    assert_ssh_return_code(session, rc);
 |  | ||||||
| +
 |  | ||||||
| +    /* Cleanup */
 |  | ||||||
| +    ssh_scp_close(scp);
 |  | ||||||
| +    ssh_scp_free(scp);
 |  | ||||||
| +
 |  | ||||||
| +    /* Make sure the command was not executed */
 |  | ||||||
| +    snprintf(buf, BUF_SIZE, ALICE_HOME "/hack");
 |  | ||||||
| +    file = fopen(buf, "r");
 |  | ||||||
| +    assert_null(file);
 |  | ||||||
| +
 |  | ||||||
| +    /* Open the file and check content */
 |  | ||||||
| +    snprintf(buf, BUF_SIZE, "%s"
 |  | ||||||
| +             "/;touch hack/original",
 |  | ||||||
| +             ts->tmp_dir);
 |  | ||||||
| +
 |  | ||||||
| +    file = fopen(buf, "r");
 |  | ||||||
| +    assert_non_null(file);
 |  | ||||||
| +
 |  | ||||||
| +    rs = fgets(buf, 1024, file);
 |  | ||||||
| +    assert_non_null(rs);
 |  | ||||||
| +    assert_string_equal(buf, "original");
 |  | ||||||
| +
 |  | ||||||
| +    fclose(file);
 |  | ||||||
| +}
 |  | ||||||
| +
 |  | ||||||
|  int torture_run_tests(void) |  | ||||||
|  { |  | ||||||
|      int rc; |  | ||||||
| @@ -559,6 +640,9 @@ int torture_run_tests(void)
 |  | ||||||
|          cmocka_unit_test_setup_teardown(torture_scp_upload_newline, |  | ||||||
|                                          session_setup, |  | ||||||
|                                          session_teardown), |  | ||||||
| +        cmocka_unit_test_setup_teardown(torture_scp_upload_appended_command,
 |  | ||||||
| +                                        session_setup,
 |  | ||||||
| +                                        session_teardown),
 |  | ||||||
|      }; |  | ||||||
|   |  | ||||||
|      ssh_init(); |  | ||||||
| -- 
 |  | ||||||
| 2.26.2 |  | ||||||
| 
 |  | ||||||
| @ -1,58 +0,0 @@ | |||||||
| From f10d80047c660e33f5c365bf3cf436a0c2a300f1 Mon Sep 17 00:00:00 2001 |  | ||||||
| From: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> |  | ||||||
| Date: Tue, 23 Jun 2020 18:31:47 +0200 |  | ||||||
| Subject: [PATCH] tests: Do not parse configuration file in torture_knownhosts |  | ||||||
| 
 |  | ||||||
| The test might fail if there is a local configuration file that changes |  | ||||||
| the location of the known_hosts file.  The test should not be affected |  | ||||||
| by configuration files present in the testing environment. |  | ||||||
| 
 |  | ||||||
| Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> |  | ||||||
| Reviewed-by: Jakub Jelen <jjelen@redhat.com> |  | ||||||
| ---
 |  | ||||||
|  tests/client/torture_knownhosts.c | 8 ++++++++ |  | ||||||
|  1 file changed, 8 insertions(+) |  | ||||||
| 
 |  | ||||||
| diff --git a/tests/client/torture_knownhosts.c b/tests/client/torture_knownhosts.c
 |  | ||||||
| index fcc54846..55aee217 100644
 |  | ||||||
| --- a/tests/client/torture_knownhosts.c
 |  | ||||||
| +++ b/tests/client/torture_knownhosts.c
 |  | ||||||
| @@ -307,6 +307,7 @@ static void torture_knownhosts_other_auto(void **state) {
 |  | ||||||
|      char tmp_file[1024] = {0}; |  | ||||||
|      char *known_hosts_file = NULL; |  | ||||||
|      int rc; |  | ||||||
| +    bool process_config = false;
 |  | ||||||
|   |  | ||||||
|      snprintf(tmp_file, |  | ||||||
|               sizeof(tmp_file), |  | ||||||
| @@ -344,6 +345,9 @@ static void torture_knownhosts_other_auto(void **state) {
 |  | ||||||
|   |  | ||||||
|      s->ssh.session = session; |  | ||||||
|   |  | ||||||
| +    rc = ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &process_config);
 |  | ||||||
| +    assert_ssh_return_code(session, rc);
 |  | ||||||
| +
 |  | ||||||
|      rc = ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); |  | ||||||
|      assert_ssh_return_code(session, rc); |  | ||||||
|   |  | ||||||
| @@ -368,6 +372,7 @@ static void torture_knownhosts_conflict(void **state) {
 |  | ||||||
|      char *known_hosts_file = NULL; |  | ||||||
|      FILE *file; |  | ||||||
|      int rc; |  | ||||||
| +    bool process_config = false;
 |  | ||||||
|   |  | ||||||
|      snprintf(tmp_file, |  | ||||||
|               sizeof(tmp_file), |  | ||||||
| @@ -411,6 +416,9 @@ static void torture_knownhosts_conflict(void **state) {
 |  | ||||||
|   |  | ||||||
|      s->ssh.session = session; |  | ||||||
|   |  | ||||||
| +    rc = ssh_options_set(session, SSH_OPTIONS_PROCESS_CONFIG, &process_config);
 |  | ||||||
| +    assert_ssh_return_code(session, rc);
 |  | ||||||
| +
 |  | ||||||
|      ssh_options_set(session, SSH_OPTIONS_HOST, TORTURE_SSH_SERVER); |  | ||||||
|      ssh_options_set(session, SSH_OPTIONS_KNOWNHOSTS, known_hosts_file); |  | ||||||
|      rc = ssh_options_set(session, SSH_OPTIONS_HOSTKEYS, "rsa-sha2-256"); |  | ||||||
| -- 
 |  | ||||||
| 2.26.2 |  | ||||||
| 
 |  | ||||||
| @ -1,43 +0,0 @@ | |||||||
| From 750e4f3f9d3ec879929801d65a500ec3ad84ff67 Mon Sep 17 00:00:00 2001 |  | ||||||
| From: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> |  | ||||||
| Date: Thu, 18 Jun 2020 19:08:54 +0200 |  | ||||||
| Subject: [PATCH] channel: Do not return error if the server closed the channel |  | ||||||
| 
 |  | ||||||
| If the server properly closed the channel, the client should not return |  | ||||||
| error if it finds the channel closed. |  | ||||||
| 
 |  | ||||||
| Fixes T231 |  | ||||||
| 
 |  | ||||||
| Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> |  | ||||||
| Reviewed-by: Jakub Jelen <jjelen@redhat.com> |  | ||||||
| ---
 |  | ||||||
|  src/channels.c | 7 ++++--- |  | ||||||
|  1 file changed, 4 insertions(+), 3 deletions(-) |  | ||||||
| 
 |  | ||||||
| diff --git a/src/channels.c b/src/channels.c
 |  | ||||||
| index 9fe309d0..607bd568 100644
 |  | ||||||
| --- a/src/channels.c
 |  | ||||||
| +++ b/src/channels.c
 |  | ||||||
| @@ -2932,15 +2932,16 @@ int ssh_channel_read_timeout(ssh_channel channel,
 |  | ||||||
|    if (session->session_state == SSH_SESSION_STATE_ERROR) { |  | ||||||
|        return SSH_ERROR; |  | ||||||
|    } |  | ||||||
| +  /* If the server closed the channel properly, there is nothing to do */
 |  | ||||||
| +  if (channel->remote_eof && ssh_buffer_get_len(stdbuf) == 0) {
 |  | ||||||
| +      return 0;
 |  | ||||||
| +  }
 |  | ||||||
|    if (channel->state == SSH_CHANNEL_STATE_CLOSED) { |  | ||||||
|        ssh_set_error(session, |  | ||||||
|                      SSH_FATAL, |  | ||||||
|                      "Remote channel is closed."); |  | ||||||
|        return SSH_ERROR; |  | ||||||
|    } |  | ||||||
| -  if (channel->remote_eof && ssh_buffer_get_len(stdbuf) == 0) {
 |  | ||||||
| -    return 0;
 |  | ||||||
| -  }
 |  | ||||||
|    len = ssh_buffer_get_len(stdbuf); |  | ||||||
|    /* Read count bytes if len is greater, everything otherwise */ |  | ||||||
|    len = (len > count ? count : len); |  | ||||||
| -- 
 |  | ||||||
| 2.26.2 |  | ||||||
| 
 |  | ||||||
| @ -1,18 +0,0 @@ | |||||||
| --- a/tests/torture.c	2020-04-09 16:16:07.691894761 +0200
 |  | ||||||
| +++ b/tests/torture.c	2020-04-09 20:11:50.577962771 +0200
 |  | ||||||
| @@ -636,6 +636,15 @@
 |  | ||||||
|  # else /* HAVE_DSA */ |  | ||||||
|               "HostKeyAlgorithms +ssh-rsa\n" |  | ||||||
|  # endif /* HAVE_DSA */ |  | ||||||
| +/* Add back algorithms removed from default in OpenSSH-8.2 due to SHA1
 |  | ||||||
| + * deprecation*/
 |  | ||||||
| +# if (OPENSSH_VERSION_MAJOR == 8 && OPENSSH_VERSION_MINOR >= 2)
 |  | ||||||
| +             "KexAlgorithms +diffie-hellman-group14-sha1,"
 |  | ||||||
| +             "diffie-hellman-group-exchange-sha1,"
 |  | ||||||
| +             "diffie-hellman-group1-sha1\n"
 |  | ||||||
| +             "HostKeyAlgorithms +ssh-rsa\n"
 |  | ||||||
| +             "CASignatureAlgorithms +ssh-rsa\n"
 |  | ||||||
| +#endif
 |  | ||||||
|  # if (OPENSSH_VERSION_MAJOR == 7 && OPENSSH_VERSION_MINOR < 6) |  | ||||||
|               "Ciphers +3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc\n" |  | ||||||
|  # else /* OPENSSH_VERSION 7.0 - 7.5 */ |  | ||||||
| @ -1,41 +0,0 @@ | |||||||
| diff -up libssh-0.9.4/src/buffer.c.fix-cve-2020-16135 libssh-0.9.4/src/buffer.c
 |  | ||||||
| --- libssh-0.9.4/src/buffer.c.fix-cve-2020-16135	2021-04-21 10:27:53.562473773 +0200
 |  | ||||||
| +++ libssh-0.9.4/src/buffer.c	2021-04-21 10:29:21.768165663 +0200
 |  | ||||||
| @@ -299,6 +299,10 @@ int ssh_buffer_reinit(struct ssh_buffer_
 |  | ||||||
|   */ |  | ||||||
|  int ssh_buffer_add_data(struct ssh_buffer_struct *buffer, const void *data, uint32_t len) |  | ||||||
|  { |  | ||||||
| +  if (buffer == NULL) {
 |  | ||||||
| +      return -1;
 |  | ||||||
| +  }
 |  | ||||||
| +
 |  | ||||||
|    buffer_verify(buffer); |  | ||||||
|   |  | ||||||
|    if (data == NULL) { |  | ||||||
| diff -up libssh-0.9.4/src/sftpserver.c.fix-cve-2020-16135 libssh-0.9.4/src/sftpserver.c
 |  | ||||||
| --- libssh-0.9.4/src/sftpserver.c.fix-cve-2020-16135	2021-04-21 10:30:43.864796642 +0200
 |  | ||||||
| +++ libssh-0.9.4/src/sftpserver.c	2021-04-21 10:41:52.166933113 +0200
 |  | ||||||
| @@ -67,9 +67,20 @@ sftp_client_message sftp_get_client_mess
 |  | ||||||
|   |  | ||||||
|    /* take a copy of the whole packet */ |  | ||||||
|    msg->complete_message = ssh_buffer_new(); |  | ||||||
| -  ssh_buffer_add_data(msg->complete_message,
 |  | ||||||
| -                      ssh_buffer_get(payload),
 |  | ||||||
| -                      ssh_buffer_get_len(payload));
 |  | ||||||
| +  if (msg->complete_message == NULL) {
 |  | ||||||
| +      ssh_set_error_oom(session);
 |  | ||||||
| +      sftp_client_message_free(msg);
 |  | ||||||
| +      return NULL;
 |  | ||||||
| +  }
 |  | ||||||
| +
 |  | ||||||
| +  rc = ssh_buffer_add_data(msg->complete_message,
 |  | ||||||
| +                           ssh_buffer_get(payload),
 |  | ||||||
| +                           ssh_buffer_get_len(payload));
 |  | ||||||
| +  if (rc < 0) {
 |  | ||||||
| +      ssh_set_error_oom(session);
 |  | ||||||
| +      sftp_client_message_free(msg);
 |  | ||||||
| +      return NULL;
 |  | ||||||
| +  }
 |  | ||||||
|   |  | ||||||
|    ssh_buffer_get_u32(payload, &msg->id); |  | ||||||
|   |  | ||||||
| @ -1,11 +0,0 @@ | |||||||
| --- a/include/libssh/libssh.h	2020-04-15 13:38:32.899177005 +0200
 |  | ||||||
| +++ b/include/libssh/libssh.h	2020-04-15 13:38:57.406454427 +0200
 |  | ||||||
| @@ -79,7 +79,7 @@
 |  | ||||||
|  /* libssh version */ |  | ||||||
|  #define LIBSSH_VERSION_MAJOR  0 |  | ||||||
|  #define LIBSSH_VERSION_MINOR  9 |  | ||||||
| -#define LIBSSH_VERSION_MICRO  3
 |  | ||||||
| +#define LIBSSH_VERSION_MICRO  4
 |  | ||||||
|   |  | ||||||
|  #define LIBSSH_VERSION_INT SSH_VERSION_INT(LIBSSH_VERSION_MAJOR, \ |  | ||||||
|                                             LIBSSH_VERSION_MINOR, \ |  | ||||||
| @ -1,16 +0,0 @@ | |||||||
| -----BEGIN PGP SIGNATURE----- |  | ||||||
| 
 |  | ||||||
| iQIzBAABCgAdFiEEjf9T4Y8qvI2PPJIjfuD8TcwBTj0FAl6O0BgACgkQfuD8TcwB |  | ||||||
| Tj0dCQ/+J0pjZU6uu7h6gkc4BbRciCpYDIv66Lw9iCc2bQmLLhPrukWjz6/PDV+U |  | ||||||
| iL/1dlwxG8rOlXdtCEFGyDvm0y4E8NaQCcgjU9jA8nsXo+SyyJAeWT7BeI3m2hPi |  | ||||||
| tjbLAjQVHCW1jIite1dJeoPIPg15LChc08t+HWVI3pwQviwlJWTPmHgMaT3uwa1X |  | ||||||
| fD66hjgB2UFo5eYnbION3L/jpA0vsI4o4F5CFPEhgbz3H6KmrgQbKLPM3H/103zU |  | ||||||
| XjtHEw7gy/85OmjpcskMrUVAMbw9EZ5ESFOrKyuQaFBY57L//tAdUaEloxsMKt+5 |  | ||||||
| nmYunmlGmDLT6rHfjSg5X1S+NsQaXhGelc0TLVgvlzs4kR+QbApR1ewKTcsYlVwr |  | ||||||
| jYG+PuAiROqc18xM/fQYh8UqohluDBmUpEDmVOEKT2tg/S7R5RJtOxdmcZPsLO+W |  | ||||||
| EOoP+OeUvQqNlzqu6kBRI4v2lwVU4QwDzKCNRzwQHJOH+azH/3FRJBDF1ZAQvgxy |  | ||||||
| w/NqlpFO6P76e0SLzBjHCDyqwbAzfq4WK3f5oE0RAA5RlndWusovTAWaYrAbVaoz |  | ||||||
| emkt/guiHHsbLy6S2ELJu4BI9TGGtDMJoo1ScMMQzFqijUISCBgK/+6mUVUlMli0 |  | ||||||
| lTH6VE+MvpElADE+IYSXWOLHrspTxVa/jVun3iYE8Nexn6G0XE0= |  | ||||||
| =xSu8 |  | ||||||
| -----END PGP SIGNATURE----- |  | ||||||
							
								
								
									
										16
									
								
								SOURCES/libssh-0.9.6.tar.xz.asc
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								SOURCES/libssh-0.9.6.tar.xz.asc
									
									
									
									
									
										Normal file
									
								
							| @ -0,0 +1,16 @@ | |||||||
|  | -----BEGIN PGP SIGNATURE----- | ||||||
|  | 
 | ||||||
|  | iQIzBAABCgAdFiEEjf9T4Y8qvI2PPJIjfuD8TcwBTj0FAmEniOkACgkQfuD8TcwB | ||||||
|  | Tj0TKQ/9HiMAGSMHoQ+iPVLP06iTc6Cy7rNyON2nPDQwAz0V/dfvkrKAAEflfgYd | ||||||
|  | 3pt3dbE/qgh2kgQLb9kpbCUmFoGuLgKz36RPOsggwuOsN+eD1n65q8W39sMOQid3 | ||||||
|  | bjUIOKRdYWC1suZ9fMAO1Ignl69Opd8dAq1Has9YzglaeQaV/lnYQOW4UG0xKHck | ||||||
|  | ZOp2qLfjmaQiBAI61eRyxqIYC0F67WKd0bo9D2csoocDVvHLq4syPdbMOfDTB+LL | ||||||
|  | KZSAZVW1R1JUVZMkp/P/HU11jNNy3wKoLafocnq8bXkPVrqhyuo+hDJV/OPUvFLa | ||||||
|  | VE/BzIRoMNG+1R+GJpwE7ut2DIHPxnZTThRkeVN5qP1+hbhgLJhW62I+HeAnD4s+ | ||||||
|  | +W7fwJovN28I+wqSjVEP8JguprVuoDAX5jVHbeZoMT7p8ATA4Nh3KCbYELEwTtFG | ||||||
|  | zsEIlBvoNXD3ce7xGXL3MPqfgKqrZQjRG/iOWvKwDV7WrqK1cFFyL7aeBfK2+dQq | ||||||
|  | 1Ew7aYlTsH6Hap7XByeSsy4Z5ts3VXIoFix/h+Br5OTYKYgITM7bijNAQ6A2ZWQN | ||||||
|  | TxCv8X0sVyaGyXhxG6QhrEWZjFe496MneZkq9e6HKZyaSbzwFwMgOvrUUC7fa8e5 | ||||||
|  | o1Rvozah81U0nsikwTmDrm15RSK3mr2X34zPW2Ahzr1I5tGZzOk= | ||||||
|  | =cO0k | ||||||
|  | -----END PGP SIGNATURE----- | ||||||
| @ -1,5 +1,5 @@ | |||||||
| Name:           libssh | Name:           libssh | ||||||
| Version:        0.9.4 | Version:        0.9.6 | ||||||
| Release:        3%{?dist} | Release:        3%{?dist} | ||||||
| Summary:        A library implementing the SSH protocol | Summary:        A library implementing the SSH protocol | ||||||
| License:        LGPLv2+ | License:        LGPLv2+ | ||||||
| @ -11,13 +11,6 @@ Source2:        https://cryptomilk.org/gpgkey-8DFF53E18F2ABC8D8F3C92237EE0FC4DCC | |||||||
| Source3:        libssh_client.config | Source3:        libssh_client.config | ||||||
| Source4:        libssh_server.config | Source4:        libssh_server.config | ||||||
| 
 | 
 | ||||||
| Patch0:         libssh-0.9.4-enable-sshd-sha1-algorithms.patch |  | ||||||
| Patch1:         libssh-0.9.4-fix-version.patch |  | ||||||
| Patch2:         libssh-0.9.4-do-not-return-error-server-closed-channel.patch |  | ||||||
| Patch3:         libssh-0.9.4-add-cve-2019-14889-test.patch |  | ||||||
| Patch4:         libssh-0.9.4-do-not-parse-config-during-tests.patch |  | ||||||
| Patch5:         libssh-0.9.4-fix-cve-2020-16135.patch |  | ||||||
| 
 |  | ||||||
| BuildRequires:  cmake | BuildRequires:  cmake | ||||||
| BuildRequires:  doxygen | BuildRequires:  doxygen | ||||||
| BuildRequires:  gcc-c++ | BuildRequires:  gcc-c++ | ||||||
| @ -27,6 +20,13 @@ BuildRequires:  pkgconfig | |||||||
| BuildRequires:  zlib-devel | BuildRequires:  zlib-devel | ||||||
| BuildRequires:  krb5-devel | BuildRequires:  krb5-devel | ||||||
| BuildRequires:  libcmocka-devel | BuildRequires:  libcmocka-devel | ||||||
|  | BuildRequires:  openssh-clients | ||||||
|  | BuildRequires:  openssh-server | ||||||
|  | BuildRequires:  pam_wrapper | ||||||
|  | BuildRequires:  socket_wrapper | ||||||
|  | BuildRequires:  nss_wrapper | ||||||
|  | BuildRequires:  uid_wrapper | ||||||
|  | BuildRequires:  nmap-ncat | ||||||
| 
 | 
 | ||||||
| Requires:       crypto-policies | Requires:       crypto-policies | ||||||
| Requires:       %{name}-config = %{version}-%{release} | Requires:       %{name}-config = %{version}-%{release} | ||||||
| @ -136,6 +136,27 @@ popd | |||||||
| %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/libssh/libssh_server.config | %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/libssh/libssh_server.config | ||||||
| 
 | 
 | ||||||
| %changelog | %changelog | ||||||
|  | * Fri Nov 05 2021 Norbert Pocs <npocs@redhat.com> - 0.9.6-3 | ||||||
|  | - Remove STI tests | ||||||
|  | 
 | ||||||
|  | * Thu Oct 21 2021 Norbert Pocs <npocs@redhat.com> - 0.9.6-2 | ||||||
|  | - Remove bad patch causing errors | ||||||
|  | - Adding BuildRequires for openssh (SSHD support) | ||||||
|  | 
 | ||||||
|  | * Thu Oct 14 2021 Norbert Pocs <npocs@redhat.com> - 0.9.6-1 | ||||||
|  | - Fix CVE-2021-3634: Fix possible heap-buffer overflow when | ||||||
|  |   rekeying with different key exchange mechanism | ||||||
|  | - Rebase to version 0.9.6 | ||||||
|  | - Rename SSHD_EXECUTABLE to SSH_EXECUTABLE in tests/torture.c | ||||||
|  | - Resolves: rhbz#1896651, rhbz#1994600 | ||||||
|  | 
 | ||||||
|  | * Thu Oct 14 2021 Sahana Prasad <sahana@redhat.com> - 0.9.4-4 | ||||||
|  | - Revert previous commit as it is incorrect. | ||||||
|  | 
 | ||||||
|  | * Thu Oct 14 2021 Norbert Pocs <npocs@redhat.com> - 0.9.6-1 | ||||||
|  | - Fix CVE-2021-3634: Fix possible heap-buffer overflow when | ||||||
|  |   rekeying with different key exchange mechanism (#1978810) | ||||||
|  | 
 | ||||||
| * Wed Apr 21 2021 Sahana Prasad <sahana@redhat.com> - 0.9.4-3 | * Wed Apr 21 2021 Sahana Prasad <sahana@redhat.com> - 0.9.4-3 | ||||||
| - Fix CVE-2020-16135 NULL pointer dereference in sftpserver.c if | - Fix CVE-2020-16135 NULL pointer dereference in sftpserver.c if | ||||||
|   ssh_buffer_new returns NULL (#1862646) |   ssh_buffer_new returns NULL (#1862646) | ||||||
|  | |||||||
		Loading…
	
		Reference in New Issue
	
	Block a user