4 Commits

Author SHA256 Message Date
d7bcf5b155 - Fix CVEs
* GO-2025-4135 (CVE-2025-47914)
    SSH Agent servers do not validate the size of messages
    when processing new identity requests, which may cause
    the program to panic if the message is malformed due to
    an out of bounds read.
  * GO-2025-4116 (CVE-2025-47913)
    SSH clients receiving SSH_AGENT_SUCCESS when expecting a
    typed response will panic and cause early termination of
    the client process.
  * GO-2025-4134 (CVE-2025-58181, bsc#1253952).
    SSH servers parsing GSSAPI authentication
    requests do not validate the number of mechanisms
    specified in the request, allowing an attacker to cause
    unbounded memory consumption.

Signed-off-by: Egbert Eich <eich@suse.com>
2026-01-06 19:13:44 +01:00
f243e8b856 Update to v0.32.0 2025-12-10 13:48:14 +00:00
32f85cda15 add shell completions & basic binary %check 2025-11-05 15:50:21 +05:30
7260cade95 Initial import
Package originated from science:machinelearning:mcp/mcphost

Signed-off-by: Egbert Eich <eich@suse.com>
2025-10-30 17:19:42 +01:00