summaryrefslogtreecommitdiff
path: root/security/libssh
AgeCommit message (Collapse)AuthorFilesLines
2022-01-29libssh: stop pulling in argp in buildlink3.mkwiz1-2/+1
2022-01-29libssh: argp is only used for examples, which are not installedwiz1-2/+4
Bump PKGREVISION
2022-01-29libssh: cmocka is a test framework and thus only needed at build timewiz1-2/+4
Bump PKGREVISION.
2021-10-26security: Replace RMD160 checksums with BLAKE2s checksumsnia1-2/+2
All checksums have been double-checked against existing RMD160 and SHA512 hashes Unfetchable distfiles (fetched conditionally?): ./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
2021-10-21*: recursive bump for heimdal 7.7.0wiz2-3/+4
its buildlink3.mk now includes openssl's buildlink3.mk
2021-10-07security: Remove SHA1 hashes for distfilesnia1-2/+1
2021-08-30libssh: update to 0.96.wiz3-10/+10
version 0.9.6 (released 2021-08-26) * CVE-2021-3634: Fix possible heap-buffer overflow when rekeying with different key exchange mechanism * Fix several memory leaks on error paths * Reset pending_call_state on disconnect * Fix handshake bug with AEAD ciphers and no HMAC overlap * Use OPENSSL_CRYPTO_LIBRARIES in CMake * Ignore request success and failure message if they are not expected * Support more identity files in configuration * Avoid setting compiler flags directly in CMake * Support build directories with special characters * Include stdlib.h to avoid crash in Windows * Fix sftp_new_channel constructs an invalid object * Fix Ninja multiple rules error * Several tests fixes
2020-09-13libssh: Fix build on SunOS/SmartOSotis2-1/+19
Instruct cmake to look for sshd executable also in /usr/lib/ssh
2020-09-13libssh: update to 0.95.wiz4-15/+15
version 0.9.5 (released 2020-XX-XX) * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite
2020-09-02libssh: Disable building examplesnia1-1/+3
They don't get installed and at least one of them doesn't like NetBSD 8. Bump PKGREVISION
2020-07-20security/libssh: Build fixmicha2-1/+19
Include header files with declarations for struct sockaddr_in and send(). OK from is@.
2020-04-12libssh: update to 0.94.wiz3-11/+10
version 0.9.4 (released 2020-04-09) * Fixed CVE-2020-1730 - Possible DoS in client and server when handling AES-CTR keys with OpenSSL * Added diffie-hellman-group14-sha256 * Fixed serveral possible memory leaks
2020-01-26all: migrate homepages from http to httpsrillig1-2/+2
pkglint -r --network --only "migrate" As a side-effect of migrating the homepages, pkglint also fixed a few indentations in unrelated lines. These and the new homepages have been checked manually.
2020-01-25*: Remove obsolete BUILDLINK_API_DEPENDS.openssl.jperkin1-2/+1
2020-01-18*: Recursive revision bump for openssl 1.1.1.jperkin2-3/+4
2020-01-06Fix build on NetBSD 8.1pho2-1/+16
2019-12-31libssh: update to 0.93.wiz3-11/+10
version 0.9.3 (released 2019-12-10) * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer
2019-11-28libssh: fix build on Solaris.bsiegert1-1/+3
From Joern Clausen in PR pkg/54694.
2019-11-23Recursive revbump based on devel/cmocka 1.1.3 -> 1.1.5mef1-1/+2
2019-11-13libssh: update to 0.92.wiz3-10/+10
version 0.9.2 (released 2019-11-07) * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)
2019-11-06libssh: update to 0.91.wiz3-10/+11
version 0.9.1 (released 2019-10-25) * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)
2019-09-18libssh: update patchnia1-5/+14
2019-09-15libssh: Update to 0.90nia3-11/+11
ChangeLog Added support for AES-GCM Added improved rekeying support Added performance improvements Disabled blowfish support by default Fixed several ssh config parsing issues Added support for DH Group Exchange KEX Added support for Encrypt-then-MAC mode Added support for parsing server side configuration file Added support for ECDSA/Ed25519 certificates Added FIPS 140-2 compatibility Improved known_hosts parsing Improved documentation Improved OpenSSL API usage for KEX, DH, KDF and signatures
2019-03-20libssh: update to 0.87.wiz3-10/+10
version 0.8.7 (released 2019-02-25) * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector
2019-02-13libssh: update to 0.86.wiz3-11/+10
version 0.8.6 (released 2018-12-24) * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling
2018-12-05libssh: fix pkgconfig file.wiz1-2/+5
Fix build on NetBSD by removing -Werror=strict-overflow. Bump PKGREVISION.
2018-12-03libssh: updated to 0.8.5adam8-82/+61
version 0.8.5: * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL version 0.8.4: * Fixed CVE-2018-10933 * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets version 0.8.3: * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce posix-rename@openssh.com and hardlink@openssh.com in the sftp server version 0.8.2: * Added sha256 fingerprints for pubkeys * Improved compiler flag detection * Fixed race condition in reading sftp messages * Fixed doxygen generation and added modern style * Fixed library initialization on Windows * Fixed __bounded__ attribute detection * Fixed a bug in the options parser * Fixed documentation for new knwon_hosts API version 0.8.1: * Fixed version number in the header * Fixed version number in pkg-config and cmake config * Fixed library initialization * Fixed attribute detection version 0.8.0: * Removed support for deprecated SSHv1 protocol * Added new connector API for clients * Added new known_hosts parsing API * Added support for OpenSSL 1.1 * Added support for chacha20-poly1305 cipher * Added crypto backend for mbedtls crypto library * Added ECDSA support with gcrypt backend * Added advanced client and server testing using cwrap.org * Added support for curve25519-sha256 alias * Added support for global known_hosts file * Added support for symbol versioning * Improved ssh_config parsing * Improved threading support
2018-10-16libssh: update to 0.7.6. security fix.maya3-13/+13
version 0.7.6 (released 2018-10-16) * Fixed CVE-2018-10933 * Added support for OpenSSL 1.1 * Added SHA256 support for ssh_get_publickey_hash() * Fixed config parsing * Fixed random memory corruption when importing pubkeys version 0.7.5 (released 2017-04-13) * Fixed a memory allocation issue with buffers * Fixed PKI on Windows * Fixed some SSHv1 functions * Fixed config hostname expansion version 0.7.4 (released 2017-02-03) * Added id_ed25519 to the default identity list * Fixed sftp EOF packet handling * Fixed ssh_send_banner() to confirm with RFC 4253 * Fixed some memory leaks
2018-02-02libssh: Leave pkgsrc to handle security features.jperkin2-1/+24
2018-01-25libssh: fix options.mk for current cmake based buildmarkd1-6/+4
2016-10-09Add missing dependency: devel/argpkamil2-3/+6
This fixes build on NetBSD-7.99.39 with pkgsrc-current from 2016-10-09. Bump PKGREVISION to 2.
2016-03-05Bump PKGREVISION for security/openssl ABI bump.jperkin2-3/+4
2016-02-23Update libssh to 0.7.3:wiz3-14/+13
version 0.7.3 (released 2016-01-23) * Fixed CVE-2016-0739 * Fixed ssh-agent on big endian * Fixed some documentation issues
2016-02-23Fix option handling in bl3.mk.wiz1-4/+3
2015-11-18Restore SHA512 checksumwiz1-1/+2
2015-11-18Pass pkglint.christos4-18/+23
2015-11-17update to 0.72 since the previous versions have known security issues.christos4-18/+19
2015-11-04Add SHA512 digests for distfiles for security categoryagc1-1/+2
Problems found locating distfiles: Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz Package libidea: missing distfile libidea-0.8.2b.tar.gz Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2 Package uvscan: missing distfile vlp4510e.tar.Z Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
2014-02-12Recursive PKGREVISION bump for OpenSSL API version bump.tron2-4/+4
2014-01-27Do not set FETCH_USING, should not be set in a package Makefile.wiz1-7/+1
2014-01-09Needs zlib.jperkin1-1/+2
2014-01-01Recursive PKGREVISION bump for libgcrypt-1.6.0 shlib major bump.wiz1-2/+2
2013-04-08Remove "Trailing empty lines." and/or "Trailing white-space."rodent1-2/+2
2013-02-06PKGREVISION bumps for the security/openssl 1.0.1d update.jperkin2-3/+4
2013-02-01Make pkg_info show the upstream version, for comparison to advisories etc.is1-4/+5
2013-02-01fix typois1-1/+1
2013-02-01Commit missing file, and fix the version gate. Thanks to Noud de Brouweris2-3/+32
for beta-testing the package.
2013-02-01Update libssh to (upstream) 0.5.4 == (our) 0.54.is2-60/+12
(We need to keep the old numbering syntax to make versions compare correctly.) There are only two consumers in pkgsrc; one of them (remmina and remmina-plugins) actually needed library version 0.4 or later, and didn't build the ssh/sftp/nx plugins without. Hydra is also supposed to build with 0.4.x and later.) Upstream changelogs: 0.5.4: CVE-2013-0176 - NULL dereference leads to denial of service Fixed several NULL pointer dereferences in SSHv1. Fixed a free crash bug in options parsing. and for completeness 0.5.3: This is an important SECURITY and maintenance release in order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561 and CVE-2012-4562. CVE-2012-4559 - Fix multiple double free() flaws CVE-2012-4560 - Fix multiple buffer overflow flaws CVE-2012-4561 - Fix multiple invalid free() flaws CVE-2012-4562 - Fix multiple improper overflow checks (...) Suggested by Noud de Brouwer in wip/libssh and PR pkg/47518, but needed some changes to PLIST as well as to make "pkg_admin audit" and updates compare correctly.
2013-02-01Update libssh to (upstream) 0.5.4 == (our) 0.54.is2-9/+18
(We need to keep the old numbering syntax to make versions compare correctly.) There are only two consumers in pkgsrc; one of them (remmina and remmina-plugins) actually needed library version 0.4 or later, and didn't build the ssh/sftp/nx plugins without. Hydra is also supposed to build with 0.4.x and later.) Upstream changelogs: 0.5.4: CVE-2013-0176 - NULL dereference leads to denial of service Fixed several NULL pointer dereferences in SSHv1. Fixed a free crash bug in options parsing. and for completeness 0.5.3: This is an important SECURITY and maintenance release in order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561 and CVE-2012-4562. CVE-2012-4559 - Fix multiple double free() flaws CVE-2012-4560 - Fix multiple buffer overflow flaws CVE-2012-4561 - Fix multiple invalid free() flaws CVE-2012-4562 - Fix multiple improper overflow checks (...)
2013-02-01Update libssh to (upstream) 0.5.4 == (our) 0.54.is2-28/+37
(We need to keep the old numbering syntax to make versions compare correctly.) There are only two consumers in pkgsrc; one of them (remmina and remmina-plugins) actually needed library version 0.4 or later, and didn't build the ssh/sftp/nx plugins without. Hydra is also supposed to build with 0.4.x and later.) Upstream changelogs: 0.5.4: CVE-2013-0176 - NULL dereference leads to denial of service Fixed several NULL pointer dereferences in SSHv1. Fixed a free crash bug in options parsing. and for completeness 0.5.3: This is an important SECURITY and maintenance release in order to address CVE-2012-4559, CVE-2012-4560, CVE-2012-4561 and CVE-2012-4562. CVE-2012-4559 - Fix multiple double free() flaws CVE-2012-4560 - Fix multiple buffer overflow flaws CVE-2012-4561 - Fix multiple invalid free() flaws CVE-2012-4562 - Fix multiple improper overflow checks (...) Suggested by Noud de Brouwer in wip/libssh and PR pkg/47518, but needed some changes to PLIST as well as to make "pkg_admin audit" and updates compare correctly.