Updating link to change in openSUSE:Factory/libssh revision 65.0

OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/libssh?expand=0&rev=ae1e25cb1ee0938fd102d26e2e01fc9a
This commit is contained in:
OBS User buildservice-autocommit 2021-11-03 16:26:03 +00:00 committed by Git OBS Bridge
parent f55346e796
commit 4397453d7f

View File

@ -26,12 +26,6 @@ Sun Sep 13 19:17:44 UTC 2020 - Dirk Mueller <dmueller@suse.com>
-------------------------------------------------------------------
Thu Apr 9 07:50:07 UTC 2020 - Andreas Schneider <asn@cryptomilk.org>
- Update to version 0.9.4
* https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/
-------------------------------------------------------------------
Thu Apr 9 07:50:07 UTC 2020 - Andreas Schneider <asn@cryptomilk.org>
- Update to version 0.9.4
* https://www.libssh.org/2020/04/09/libssh-0-9-4-and-libssh-0-8-9-security-release/
* Fix possible Denial of Service attack when using AES-CTR-ciphers
@ -47,24 +41,6 @@ Tue Feb 18 14:05:49 UTC 2020 - Dominique Leuenberger <dimstar@opensuse.org>
-------------------------------------------------------------------
Tue Dec 10 19:08:47 UTC 2019 - Andreas Schneider <asn@cryptomilk.org>
- Update to version 0.9.3
* Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution
* SSH-01-003 Client: Missing NULL check leads to crash in erroneous state
* SSH-01-006 General: Various unchecked Null-derefs cause DOS
* SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys
* SSH-01-010 SSH: Deprecated hash function in fingerprinting
* SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS
* SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access
* SSH-01-001 State Machine: Initial machine states should be set explicitly
* SSH-01-002 Kex: Differently bound macros used to iterate same array
* SSH-01-005 Code-Quality: Integer sign confusion during assignments
* SSH-01-008 SCP: Protocol Injection via unescaped File Names
* SSH-01-009 SSH: Update documentation which RFCs are implemented
* SSH-01-012 PKI: Information leak via uninitialized stack buffer
-------------------------------------------------------------------
Tue Dec 10 19:08:47 UTC 2019 - Andreas Schneider <asn@cryptomilk.org>
- Update to version 0.9.3
* Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution (bsc#1158095)
* SSH-01-003 Client: Missing NULL check leads to crash in erroneous state