libssh2-1-1.8.0-lp150.3.9.1<>,B]©/=„Kk„B/ܙɏDQ&2r|z_qg"Ľ/CFW5Ld+ -dڡut}q%YC\uxB|g~ Z2'UZ;It!:jE j(7Ǧ&P UW$W"~[8f4;* WN ZsΙ޿i7=b!vg2žjrTÎ&ZrR(b|T>@($?(d   G(,?HU n     $,6@hp(68@ 9h :{ >$@$F$G%H% I%X%Y%$\%L]%T^%rb%|c&%d&e&f&l&u&v&w'|x'y' z''''(Clibssh2-11.8.0lp150.3.9.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.]©armbuild19openSUSE Leap 15.0openSUSEBSD-3-Clausehttp://bugs.opensuse.orgDevelopment/Libraries/C and C++https://www.libssh2.org/linuxarmv7hl]©t]©u4da705db3d693ccb142bcec1aeb05bc71c81e8c02d7f7803febc6e4773f4d467libssh2.so.1.0.1rootrootrootrootlibssh2_org-1.8.0-lp150.3.9.1.src.rpmlibssh2-1libssh2-1(armv7hl-32)libssh2.so.1@@@@@@@@@    /sbin/ldconfig/sbin/ldconfigld-linux-armhf.so.3ld-linux-armhf.so.3(GLIBC_2.4)libc.so.6libc.so.6(GLIBC_2.4)libcrypto.so.1.1libcrypto.so.1.1(OPENSSL_1_1_0)libgcc_s.so.1libgcc_s.so.1(GCC_3.5)libz.so.1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1]@\\MZ]@YTYA%@VIUzU.@Q4Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez dimstar@opensuse.orgjengelh@inai.detchvatal@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.commvyskocil@suse.com- Security fix: [bsc#1154862, CVE-2019-17498] * The SSH_MSG_DISCONNECT:packet.c logic has an integer overflow in a bounds check that might lead to disclose sensitive information or cause a denial of service * Add patch libssh2_org-CVE-2019-17498.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- Drop openssh BuildRequires: this is only used for one of the minor self-tests.- Remove --with-pic which is only for static libs- Version update to 1.8.0: * support openssl-1.1 * many bugfixes - Fixes bsc#1042660 - Remove obsolete conditionals that are no longer needed- update to 1.7.0 * Fixes CVE-2016-0787 (boo#967026) * Changes: libssh2_session_set_last_error: Add function mac: Add support for HMAC-SHA-256 and HMAC-SHA-512 WinCNG: support for SHA256/512 HMAC kex: Added diffie-hellman-group-exchange-sha256 support OS/400 crypto library QC3 support * and many bugfixes- update to 1.6.0 Changes: Added CMake build system Added libssh2_userauth_publickey_frommemory() Bug fixes: wait_socket: wrong use of difftime() userauth: Fixed prompt text no longer being copied to the prompts struct mingw build: allow to pass custom CFLAGS Let mansyntax.sh work regardless of where it is called from Init HMAC_CTX before using it direct_tcpip: Fixed channel write WinCNG: fixed backend breakage OpenSSL: caused by introducing libssh2_hmac_ctx_init userauth.c: fix possible dereferences of a null pointer wincng: Added explicit clear memory feature to WinCNG backend openssl.c: fix possible segfault in case EVP_DigestInit fails wincng: fix return code of libssh2_md5_init() kex: do not ignore failure of libssh2_sha1_init() scp: fix that scp_send may transmit not initialised memory scp.c: improved command length calculation nonblocking examples: fix warning about unused tvdiff on Mac OS X configure: make clear-memory default but WARN if backend unsupported OpenSSL: Enable use of OpenSSL that doesn't have DSA OpenSSL: Use correct no-blowfish #define kex: fix libgcrypt memory leaks of bignum libssh2_channel_open: more detailed error message wincng: fixed memleak in (block) cipher destructor- update to 1.5.0 * fixes CVE-2015-1782 (bnc#921070) - tarball verification * added libssh2_org.keyring * added libssh2-1.5.0.tar.gz.asc Changes in 1.5.0: Added Windows Cryptography API: Next Generation based backend Bug fixes: Security Advisory: Using `SSH_MSG_KEXINIT` data unbounded, CVE-2015-1782 missing _libssh2_error in _libssh2_channel_write knownhost: Fix DSS keys being detected as unknown. knownhost: Restore behaviour of `libssh2_knownhost_writeline` with short buffer. libssh2.h: on Windows, a socket is of type SOCKET, not int libssh2_priv.h: a 1 bit bit-field should be unsigned windows build: do not export externals from static library Fixed two potential use-after-frees of the payload buffer Fixed a few memory leaks in error paths userauth: Fixed an attempt to free from stack on error agent_list_identities: Fixed memory leak on OOM knownhosts: Abort if the hosts buffer is too small sftp_close_handle: ensure the handle is always closed channel_close: Close the channel even in the case of errors docs: added missing libssh2_session_handshake.3 file docs: fixed a bunch of typos userauth_password: pass on the underlying error code _libssh2_channel_forward_cancel: accessed struct after free _libssh2_packet_add: avoid using uninitialized memory _libssh2_channel_forward_cancel: avoid memory leaks on error _libssh2_channel_write: client spins on write when window full windows build: fix build errors publickey_packet_receive: avoid junk in returned pointers channel_receive_window_adjust: store windows size always userauth_hostbased_fromfile: zero assign to avoid uninitialized use configure: change LIBS not LDFLAGS when checking for libs agent_connect_unix: make sure there's a trailing zero MinGW build: Fixed redefine warnings. sftpdir.c: added authentication method detection. Watcom build: added support for WinCNG build. configure.ac: replace AM_CONFIG_HEADER with AC_CONFIG_HEADERS sftp_statvfs: fix for servers not supporting statfvs extension knownhost.c: use LIBSSH2_FREE macro instead of free Fixed compilation using mingw-w64 knownhost.c: fixed that 'key_type_len' may be used uninitialized configure: Display individual crypto backends on separate lines examples on Windows: check for WSAStartup return code examples on Windows: check for socket return code agent.c: check return code of MapViewOfFile kex.c: fix possible NULL pointer de-reference with session->kex packet.c: fix possible NULL pointer de-reference within listen_state tests on Windows: check for WSAStartup return code userauth.c: improve readability and clarity of for-loops examples on Windows: use native SOCKET-type instead of int packet.c: i < 256 was always true and i would overflow to 0 kex.c: make sure mlist is not set to NULL session.c: check return value of session_nonblock in debug mode session.c: check return value of session_nonblock during startup userauth.c: make sure that sp_len is positive and avoid overflows knownhost.c: fix use of uninitialized argument variable wrote openssl: initialise the digest context before calling EVP_DigestInit() libssh2_agent_init: init ->fd to LIBSSH2_INVALID_SOCKET configure.ac: Add zlib to Requires.private in libssh2.pc if using zlib configure.ac: Rework crypto library detection configure.ac: Reorder --with-* options in --help output configure.ac: Call zlib zlib and not libz in text but keep option names Fix non-autotools builds: Always define the LIBSSH2_OPENSSL CPP macro sftp: seek: Don't flush buffers on same offset sftp: statvfs: Along error path, reset the correct 'state' variable. sftp: Add support for fsync (OpenSSH extension). _libssh2_channel_read: fix data drop when out of window comp_method_zlib_decomp: Improve buffer growing algorithm _libssh2_channel_read: Honour window_size_initial window_size: redid window handling for flow control reasons knownhosts: handle unknown key types- ignore groff-full to remove factory build cycle - add groff to build requires to make tests passing/sbin/ldconfig/sbin/ldconfigarmbuild19 15730384881.8.0-lp150.3.9.11.8.0-lp150.3.9.1libssh2.so.1libssh2.so.1.0.1/usr/lib/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11421/openSUSE_Leap_15.0_Update_ports/fe4c539378508a744f5691444bcf5f99-libssh2_org.openSUSE_Leap_15.0_Updatedrpmxz5armv7hl-suse-linuxELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=3063e2d0152382729ad1240ff704132210687f82, stripped PRR RRRR RRR^4J&eutf-89a1bb40de2248a29c92f60805c474197601a002cba7b1aa02c8f6a17d04d28e4?7zXZ !t/,&!]"k%{U}d涻eOB`nPzFofzm*KvfZNvAIGL?=EC鬿%.ZFc w pL2Ŷp#UܹZy,ilʾB2$N7G қ.1:.[S?aʑyZj IOԺA"qnHѬ^qqń8.[(Q 6DP*)ߎ9}*.*rj_d O6/ U C_j9FH$(g| gMVw3SCԉ|+[O \9:N#=i،Eqro wiy7tEڏf`>DnP -:,8#w+1'"zҪqOW2hdmhTL=Ni΅-/[q iE3in.ZDƢp,E <֩fɳA﹌݉Ԧi7fp"nj̒Bٌp@ԽrTl.K]~Osv;6~$]LmyY`!x d**ߚ8M8;ՆҸ(I\I/7bC_k9t455B|kW_$yAPMm|C`ڻFF/pfh1uKoZUtw FB}G0`B(5G|ϹxF :L>qe>Rffw/oͺBrs7'lf0ڏJVUSeps9s%k+y&#Cb>gka*;Tdp3Eg[I3pJ)>:s;qu:/+q}Lhf/vN L)y)x'ÚYVTו[+1ҦnJ9|tf]pT8oxZZ8 w\Clh z#1YUZ^4I I<޿ . J7=6%ۍh_H W4PLRt j P$yZZHU2'"H.D;/Mlb&U םxW$Ahţ5桇!]T5tWيΨ@{q̆&H;aX x$<q J?ׄT¹= F J7m^z@/9Ld6Ze>WsLyp@<-!Z;f.$8y~/z'u$T$ gT^gOΟuմI,"_ĠC Ͼo+v{1/JתZ$}`Q}R}>.P8[|B8qⲹ ޸;;9G}\C\dqFKKJ[#EQf#)?0&,*`ɪq`cJ }-Ucjm܊.(~D pxܦ[TD+)pz ]kxIr3TNcm;_wU."+$El-8PwE;!+s,^:5FtDFYجkf /5a'\RI@`WtahQ$Tgs5V|r qsudEXk.{ɾDvz"AC[r=LW9Ycp"%U#[|Qo+YKDH. ؅'4dx&qJ f{OȳAVkU\v}s}`QVƈv(cݢ 璾2VYf'`S#xRENJ j8V_^ |A7ƽfDpB*DsI az6L'=iq|bt 1Zu44mq)BN[z+B&580h3ۖ8+ŰEThۡ6[JL8:"$HFpU"sunY}v"ob]Pa nޤ!a+GHZ.v7z.AY\aنCϴ= Wl!oڢZZ[gB-V-o DgNkRA"`YO&rضmL=. x)s:?_M݁ :\l|o7tRqt%N=Yf/P};#>[|۾Ge2ƹ[+&sNc%WŒֆI-wG=ڑr")NԝniﱞNk~t@=`ux~;A!HZ|L,,DӪ\#~ Ÿ*t٤)V ƶRI5D'OXJePJư_ 5`|u{>2brͼ5Tl>uq%{*h|\->" %,k`ĐԡԋX/5F>סv'r ^u $VɌ$~yvsP+1miJ-'0qlqr+2 @A{Glڿ:oR!Zm?ٴmg*o{}4:ϑE'?@H;>@PS+#wIRscLk ̫(oNI `g:"Q5=ҍ}nrUR9Q&yO/[mcHWHËX월C>RYpHLz%mGw2mۏRFՠ0o= ~Ʃ"!b \0LЖ"rv:cós'^o%;>7W8dcQyD$ޠj"kA#RsGtt>ZI3qMn8jLXu0Cerx[)yӮq#Wi^ 4ſ"^3J^f3{{Njovʸ؜)8flpYzme`Mii& ?_YaKR|r Y p\.2֑7WCwr2k'n@jnAs@{ɴwۺ/ ⣮!ǫP)Q#jC#g`8}II̫!A2h8f!5 "'G>]D^51}ܤwz#@X(7g^k+Q#-ZΏY+Жr k : OqCM>cs_m4 Y۵ihIšȂ?QeԧfF'6:7Ad򽠐ψPR*kz6m_'FJCJ 4QCljl9H.-w9nBkc3 kIȃ)c7.Dz셧UfJ>OfRs~4Rs.t$$koLTKc@p1rTЧ ;4iR$BYF6@5T'~fcUt\ij.83L6W=SF (Drxz:XgP 3Fq#%&t/u-IBK3C{SUJ?T!ާG'|fOslbT 1I>K<.j2R!N*;fxEE  ]䯨dIϝ;CauvםkpGa1N [DvK$"^M&?ueHOD6~Y"$}fk˖Y! 0"ă^٭yJ,Xń7 YZ