libssh2-1-32bit-1.8.0-lp150.3.9.1<>,O]©./=„8GTs;;z]ZVDZϧZ0wHҾ<D'壹|D3uQfqrk޽y9gU4=hFL+1ձlNxqGϵnGFPKDډJ@1OM1k}5]M.[NuUgh괭U|=e^P@S݅5l"f; V҂? \"P>A(8?((d $ M ,0CLY r    " 4<FPx2(Y8` 9 : >$B$G%H% I%X%Y%(Z%T[%X\%`]%h^%b%c&Nd&e&f&l&u'v'w'x'y' '''($Clibssh2-1-32bit1.8.0lp150.3.9.1A library implementing the SSH2 protocollibssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.]©.cloud1258XopenSUSE Leap 15.0openSUSEBSD-3-Clausehttp://bugs.opensuse.orgDevelopment/Libraries/C and C++https://www.libssh2.org/linuxx86_64/sbin/ldconfig8X]©.]©.b6cf695fa31c5a4bc13e0ae58fd994bad4c4f990c2e806c1b745d7f4194c93bflibssh2.so.1.0.1rootrootrootrootlibssh2_org-1.8.0-lp150.3.9.1.src.rpmlibssh2-1-32bitlibssh2-1-32bit(x86-32)libssh2-32bitlibssh2.so.1@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libcrypto.so.1.1libcrypto.so.1.1(OPENSSL_1_1_0)libz.so.1rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1]@\\MZ]@YTYA%@VIUzU.@Q4Pedro Monreal Gonzalez Pedro Monreal Gonzalez Pedro Monreal Gonzalez dimstar@opensuse.orgjengelh@inai.detchvatal@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.commvyskocil@suse.com- Security fix: [bsc#1154862, CVE-2019-17498] * The SSH_MSG_DISCONNECT:packet.c logic has an integer overflow in a bounds check that might lead to disclose sensitive information or cause a denial of service * Add patch libssh2_org-CVE-2019-17498.patch- Fix upstream patch for CVE-2019-3859 [bsc#1133528, bsc#1130103] - Added libssh2_org-CVE-2019-3859-fix.patch- Security fixes: * [bsc#1128471, CVE-2019-3855] Possible integer overflow in transport read allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3855.patch * [bsc#1128472, CVE-2019-3856] Possible integer overflow in keyboard interactive handling allows out-of-bounds write with specially crafted payload - libssh2_org-CVE-2019-3856.patch * [bsc#1128474, CVE-2019-3857] Possible integer overflow leading to zero-byte allocation and out-of-bounds with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3857.patch * [bsc#1128476, CVE-2019-3858] Possible zero-byte allocation leading to an out-of-bounds read with a specially crafted SFTP packet - libssh2_org-CVE-2019-3858.patch * [bsc#1128480, CVE-2019-3859] Out-of-bounds reads with specially crafted payloads due to unchecked use of _libssh2_packet_require and _libssh2_packet_requirev - libssh2_org-CVE-2019-3859.patch * [bsc#1128481, CVE-2019-3860] Out-of-bounds reads with specially crafted SFTP packets - libssh2_org-CVE-2019-3860.patch * [bsc#1128490, CVE-2019-3861] Out-of-bounds reads with specially crafted SSH packets - libssh2_org-CVE-2019-3861.patch * [bsc#1128492, CVE-2019-3862] Out-of-bounds memory comparison with specially crafted message channel request SSH packet - libssh2_org-CVE-2019-3862.patch * [bsc#1128493, CVE-2019-3863] Integer overflow in user authenicate keyboard interactive allows out-of-bounds writes with specially crafted keyboard responses - libssh2_org-CVE-2019-3863.patch- Drop openssh BuildRequires: this is only used for one of the minor self-tests.- Remove --with-pic which is only for static libs- Version update to 1.8.0: * support openssl-1.1 * many bugfixes - Fixes bsc#1042660 - Remove obsolete conditionals that are no longer needed- update to 1.7.0 * Fixes CVE-2016-0787 (boo#967026) * Changes: libssh2_session_set_last_error: Add function mac: Add support for HMAC-SHA-256 and HMAC-SHA-512 WinCNG: support for SHA256/512 HMAC kex: Added diffie-hellman-group-exchange-sha256 support OS/400 crypto library QC3 support * and many bugfixes- update to 1.6.0 Changes: Added CMake build system Added libssh2_userauth_publickey_frommemory() Bug fixes: wait_socket: wrong use of difftime() userauth: Fixed prompt text no longer being copied to the prompts struct mingw build: allow to pass custom CFLAGS Let mansyntax.sh work regardless of where it is called from Init HMAC_CTX before using it direct_tcpip: Fixed channel write WinCNG: fixed backend breakage OpenSSL: caused by introducing libssh2_hmac_ctx_init userauth.c: fix possible dereferences of a null pointer wincng: Added explicit clear memory feature to WinCNG backend openssl.c: fix possible segfault in case EVP_DigestInit fails wincng: fix return code of libssh2_md5_init() kex: do not ignore failure of libssh2_sha1_init() scp: fix that scp_send may transmit not initialised memory scp.c: improved command length calculation nonblocking examples: fix warning about unused tvdiff on Mac OS X configure: make clear-memory default but WARN if backend unsupported OpenSSL: Enable use of OpenSSL that doesn't have DSA OpenSSL: Use correct no-blowfish #define kex: fix libgcrypt memory leaks of bignum libssh2_channel_open: more detailed error message wincng: fixed memleak in (block) cipher destructor- update to 1.5.0 * fixes CVE-2015-1782 (bnc#921070) - tarball verification * added libssh2_org.keyring * added libssh2-1.5.0.tar.gz.asc Changes in 1.5.0: Added Windows Cryptography API: Next Generation based backend Bug fixes: Security Advisory: Using `SSH_MSG_KEXINIT` data unbounded, CVE-2015-1782 missing _libssh2_error in _libssh2_channel_write knownhost: Fix DSS keys being detected as unknown. knownhost: Restore behaviour of `libssh2_knownhost_writeline` with short buffer. libssh2.h: on Windows, a socket is of type SOCKET, not int libssh2_priv.h: a 1 bit bit-field should be unsigned windows build: do not export externals from static library Fixed two potential use-after-frees of the payload buffer Fixed a few memory leaks in error paths userauth: Fixed an attempt to free from stack on error agent_list_identities: Fixed memory leak on OOM knownhosts: Abort if the hosts buffer is too small sftp_close_handle: ensure the handle is always closed channel_close: Close the channel even in the case of errors docs: added missing libssh2_session_handshake.3 file docs: fixed a bunch of typos userauth_password: pass on the underlying error code _libssh2_channel_forward_cancel: accessed struct after free _libssh2_packet_add: avoid using uninitialized memory _libssh2_channel_forward_cancel: avoid memory leaks on error _libssh2_channel_write: client spins on write when window full windows build: fix build errors publickey_packet_receive: avoid junk in returned pointers channel_receive_window_adjust: store windows size always userauth_hostbased_fromfile: zero assign to avoid uninitialized use configure: change LIBS not LDFLAGS when checking for libs agent_connect_unix: make sure there's a trailing zero MinGW build: Fixed redefine warnings. sftpdir.c: added authentication method detection. Watcom build: added support for WinCNG build. configure.ac: replace AM_CONFIG_HEADER with AC_CONFIG_HEADERS sftp_statvfs: fix for servers not supporting statfvs extension knownhost.c: use LIBSSH2_FREE macro instead of free Fixed compilation using mingw-w64 knownhost.c: fixed that 'key_type_len' may be used uninitialized configure: Display individual crypto backends on separate lines examples on Windows: check for WSAStartup return code examples on Windows: check for socket return code agent.c: check return code of MapViewOfFile kex.c: fix possible NULL pointer de-reference with session->kex packet.c: fix possible NULL pointer de-reference within listen_state tests on Windows: check for WSAStartup return code userauth.c: improve readability and clarity of for-loops examples on Windows: use native SOCKET-type instead of int packet.c: i < 256 was always true and i would overflow to 0 kex.c: make sure mlist is not set to NULL session.c: check return value of session_nonblock in debug mode session.c: check return value of session_nonblock during startup userauth.c: make sure that sp_len is positive and avoid overflows knownhost.c: fix use of uninitialized argument variable wrote openssl: initialise the digest context before calling EVP_DigestInit() libssh2_agent_init: init ->fd to LIBSSH2_INVALID_SOCKET configure.ac: Add zlib to Requires.private in libssh2.pc if using zlib configure.ac: Rework crypto library detection configure.ac: Reorder --with-* options in --help output configure.ac: Call zlib zlib and not libz in text but keep option names Fix non-autotools builds: Always define the LIBSSH2_OPENSSL CPP macro sftp: seek: Don't flush buffers on same offset sftp: statvfs: Along error path, reset the correct 'state' variable. sftp: Add support for fsync (OpenSSH extension). _libssh2_channel_read: fix data drop when out of window comp_method_zlib_decomp: Improve buffer growing algorithm _libssh2_channel_read: Honour window_size_initial window_size: redid window handling for flow control reasons knownhosts: handle unknown key types- ignore groff-full to remove factory build cycle - add groff to build requires to make tests passing/bin/shlibssh2-32bit1.8.0-lp150.3.9.11.8.0-lp150.3.9.11.8.0 1.8.0libssh2.so.1libssh2.so.1.0.1/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11421/openSUSE_Leap_15.0_Update/fe4c539378508a744f5691444bcf5f99-libssh2_org.openSUSE_Leap_15.0_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=a2a87b6ff54987a5b756bf864f5648f1b3789c8c, stripped PR RRRRRRRR Rutf-8c4c587ef2cd20c83c68e21c29171accab4bddd6e79b9f4e15d2dba4d0ae0a1fb?7zXZ !t/<"O]"k%kd.|ax᠉_Ywr{KiI^L~HX;DvfU]xQŕ.$PV~3܃<'Td`A-hU6N;tsF.|Y yEw.$ܞLqQX}Qn a D T ?"O@RoVS[+aE~ ۠ԵW_*a*p󹹳eCؿqj/tX0r?h:/ؕ.<d֮l% ^™ȕ6Opܤ|͵an0rs]JYQaꥇq×U+b=}*' 罬V5yVe(F 瀹ҧØ>/)2ec O\7HE[g]uMbptS¥df2q#K+HmO\$!~i&OZPۋȡ*u hJ(+  f%%v- 3 rrym-yfU'oR GA /M}jG>IcorU2FYE`R;#-,텣>y _̻$[]V)V;]Qh7ZāLw1J%9;7.[%L%-H4ZA,v XrEBڈ-N5[3܍tIZzZ n(f >!ollKCez}RX6QU2o5+klAūssbGr5F`"pP5DؐVGƻ8woLw6Wx bc\s(|xSt,p3su[av?O-7SU@xdv%| yOݨԜ OT~i.!wEs4Pyv`om(dגt2(B8y٭='(uޚqwQ!AT|ڭi}U))/.(l$]]ml;`kz2!l~-MW$ieo}R]~r</~F^df :uY5AuY4vG833~[!'r.7t@D_N{:GpMӶ[3X W'=ѣŀ?\ 6:-a#ҳY3@sqwQy#|F J1Հ)ΉoƮyȣ޺}ȕ@<[LTD[zeN*H-p#K2n3AfjVe;0r+S2o!I%D 5vѸ p =ԙURdng捾AtfnEuw"]6N<6Ap%iE+{?c)>Q|qQMlkIHht(I0\|]uROG-H"^ {?^'9QlWI k ~?4B縛ĝ{b%n+4 s }dgtbk`]|[kZ15L XBΫVeiZ=GmY&0:1,4\Vʑ+-9`+Z[ oc:%[Tנ]5җxɀ㙟 Pf…~K"φQE )uMDButIl!5 ~Zo0# E _iIy)ŬY}]Ik.v^vЁ@y:ހ E Wft4F9Q5"8WY* /@FOAޝ{vgG x;ZimۏZQZ`cJŧL9[?տvr\lOQ\X|j|]c'7|-g㤕!b؅}XM%b|n\@Lq$47~$zrsq@:%Hrk=WHc 5k:b}0(L, f%#E];ЬR_O *"brkln ($>tTgJ1Q1Eĵad7 "J Ɲqfku0 8ށ\9 Bsr>?OslrxѬ4̱ /caա^w+S" X[hVy`8?Wicq Iy@Eͅw?y OlyaYs ۬ްZ'%OAmz5k)m&fi9tԧ . i=} mlO\(W k[MSVx' ǣu%M=^Z@+{;lsmjWtl%*|0.# ͚S,aܜpKERڭbT͗387Nj-^h GqTң%:G֑G6K1?z_@h=ڂ_ 3)!zzn[7z)}m(p~V nfּͩ. Oy۟OoXK5f1?'cNvɀ V}f+G(R+=-FL)CҦ[ LDTuYwL]8INv`n}C"7Xiƅוּ͵&J'!h/6|^ Ն; HN><.pRF@ x_cq`(C#B›WwpY810ᷤS]KNJo#.է;CQ@8 2 FGD"{m &lhdr` b5u5.r!q6ѾnLy/-[U7ֽ ܵS|n>F\4,SV萋dU" QƔ,^%*Do>ۿΣ K⭋ 0ra@^c~_;9 IDEL|I{kU?15fWdHmn'4n~ Px^8~ɔn:4[VhԗW뇨Cw_KSG?YiklzfrV(E> j8=8 I5!lJ?X_i#צwVJV2v`T g(t4yR#ËΨEn:ʄ{QߞnL¡,^9\ndƌėYcma42oړjXTȠP KR\cB ?Iyrp/-&L74pnyr׀_E-U^P$-)H]5]_T6DEB@ܗDcbxփ}LnaZ7jh5|#uBkΨz}^@\b޳y\:ĚL,0uy ۱#?Mù pDOd,$jS*ZA(e)8u^PO6ۼf1t{ _FYM~͹\kYR_>& U_<甄$ğM}ٌgx~F;IIH$8+.V|JU7mN4;Ca$cLY@ʣg݌n[ дo݌)c354g~a= ]QN[ [8-[v/gxW䚴"P F(]~k+10Ka[`l}Cȋ ~͌v0x^P;{)D^| ~w~/o硼GP~' $%^"xN@E`Wm/M~N?$ee}c8 dYpȵ݅!g&[.;UoU} #!VsO? { {kЇס`Ә"A,c mK;aZi/`+3o/\l-z"H\,8Hū+>xrb+ՓU dv `hf!hrV;k)6L#Z~画8@Fh*pi87qp.ޛuIܬQUwCFv R-2`K\+^^j)x9K3RÎir} :^xX>9#υuP~:N5A*1t%O8'"h)pH#iz2;9By?mKEI2b_FgčC~އpiEQq(H %S`d3B|Nd_Z(476HMV#"'%SA5upUEoHtoyїlaD@bv!! 4E}^fFPkz^ 7cg8}?z5Y+Ǻd_6s)ikls\ "K&RymҡCF2TJ}^QQeENNy@%E%.CeI^p}oa7eׄz[*w~ytʝrecP76 K>ٌv3z>6fMCVPUf]AnCOd$?}wWp곒xJg[C: (ffD(țQ#Գ]@%3Gֻ`"L1sStp_%L:O;FEe#^TaP?|x$5|J:+ImP=Հ9wx^rÐdrB)H؀!`P>ef gkRs?_jxM|O9)HnPfYKĻvt~hUwϤ' DRUU֐31̸"v ly=kwfo{T85[:iOTMEvYmVF!\c8to/jQpC{+Cf}%7{ fʵ2BY.\?Y 9K?O ߣZ<*6~)152Fh<Ń3Ј2T 2 >p}9qɜ INv/ `h[3e pyKfNv3 ,ąe>Ee>FY|բ*YȔ~iߖ~4c%g]9b,1Eggr\'9 !^ZuM=Nw(@^E.冹%+8%\1_ }gI Y13Д?S u~O0z4$-RzYxq &#i?Z&^6}Iv`,g&=1*ciݗ*+3+0*Vq .tͶ=CP?&Nն]8uFesFA048wY=A,(\r,+ڠz"ԅп\ X opi%lf@V;+Kl]:̤iWxtZ5*H{B oWoYwEy YZ