Type: | SECURITY |
Severity: | LOW |
Release Date: | 2022-05-17 |
[0.9.6-3]
- Remove STI tests
[0.9.6-2]
- Remove bad patch causing errors
- Adding BuildRequires for openssh (SSHD support)
[0.9.6-1]
- Fix CVE-2021-3634: Fix possible heap-buffer overflow when
rekeying with different key exchange mechanism
- Rebase to version 0.9.6
- Rename SSHD_EXECUTABLE to SSH_EXECUTABLE in tests/torture.c
- Resolves: rhbz#1896651, rhbz#1994600
[0.9.4-4]
- Revert previous commit as it is incorrect.
[0.9.6-1]
- Fix CVE-2021-3634: Fix possible heap-buffer overflow when
rekeying with different key exchange mechanism (#1978810)
CVE-2021-3634 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 8 (aarch64) | libssh-0.9.6-3.el8.src.rpm | 4a44fde6c9ca89483ff68da6155c1044 | - |
libssh-0.9.6-3.el8.aarch64.rpm | ad29faa589cfdf591c76e09cc178bb58 | - | |
libssh-config-0.9.6-3.el8.noarch.rpm | ad16939b1563d8a275771a060cb70abe | - | |
libssh-devel-0.9.6-3.el8.aarch64.rpm | 9c9bad9eb84efc1fb5dac56bc76b5ed7 | - | |
Oracle Linux 8 (x86_64) | libssh-0.9.6-3.el8.src.rpm | 4a44fde6c9ca89483ff68da6155c1044 | - |
libssh-0.9.6-3.el8.i686.rpm | 01930b425e4feacdeee50d01219c701d | - | |
libssh-0.9.6-3.el8.x86_64.rpm | ae50275971d75fb8ff54f31b4576308f | - | |
libssh-config-0.9.6-3.el8.noarch.rpm | ad16939b1563d8a275771a060cb70abe | - | |
libssh-devel-0.9.6-3.el8.i686.rpm | d63d4584ac48d7763b93b2f3cbc9a9c0 | - | |
libssh-devel-0.9.6-3.el8.x86_64.rpm | 0f8e964f197af95ed802d58b4ea44746 | - |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team