libssh2-1.8.0-4.el7_9.1.x86_64
[83 KiB] |
Changelog
by Tripp Waldrop (2023-09-20):
- fix use-of-uninitialized-value (CVE-2020-22218)
|
libssh2-1.8.0-4.el7_9.1.i686
[83 KiB] |
Changelog
by Tripp Waldrop (2023-09-20):
- fix use-of-uninitialized-value (CVE-2020-22218)
|
libssh2-1.8.0-4.el7.i686
[83 KiB] |
Changelog
by Kamil Dudka (2019-10-30):
- fix integer overflow in SSH_MSG_DISCONNECT logic (CVE-2019-17498)
|
libssh2-1.8.0-4.el7.x86_64
[83 KiB] |
Changelog
by Kamil Dudka (2019-10-30):
- fix integer overflow in SSH_MSG_DISCONNECT logic (CVE-2019-17498)
|
libssh2-1.8.0-3.el7.x86_64
[83 KiB] |
Changelog
by Kamil Dudka (2019-03-20):
- sanitize public header file (detected by rpmdiff)
|
libssh2-1.8.0-3.el7.i686
[83 KiB] |
Changelog
by Kamil Dudka (2019-03-20):
- sanitize public header file (detected by rpmdiff)
|
libssh2-1.4.3-12.el7_6.3.x86_64
[126 KiB] |
Changelog
by Kamil Dudka (2019-05-27):
- fix out-of-bounds memory comparison with specially crafted message channel request (CVE-2019-3862)
|
libssh2-1.4.3-12.el7_6.3.i686
[125 KiB] |
Changelog
by Kamil Dudka (2019-05-27):
- fix out-of-bounds memory comparison with specially crafted message channel request (CVE-2019-3862)
|
libssh2-1.4.3-12.el7_6.2.i686
[125 KiB] |
Changelog
by Kamil Dudka (2019-03-20):
- sanitize public header file (detected by rpmdiff)
|
libssh2-1.4.3-12.el7_6.2.x86_64
[126 KiB] |
Changelog
by Kamil Dudka (2019-03-20):
- sanitize public header file (detected by rpmdiff)
|
libssh2-1.4.3-10.el7_2.1.i686
[132 KiB] |
Changelog
by Kamil Dudka (2016-02-19):
- use secrects of the appropriate length in Diffie-Hellman (CVE-2016-0787)
|
libssh2-1.4.3-10.el7_2.1.x86_64
[132 KiB] |
Changelog
by Kamil Dudka (2016-02-19):
- use secrects of the appropriate length in Diffie-Hellman (CVE-2016-0787)
|
libssh2-1.4.3-10.el7.x86_64
[132 KiB] |
Changelog
by Kamil Dudka (2015-06-01):
- check length of data extracted from the SSH_MSG_KEXINIT packet (CVE-2015-1782)
|
libssh2-1.4.3-10.el7.i686
[132 KiB] |
Changelog
by Kamil Dudka (2015-06-01):
- check length of data extracted from the SSH_MSG_KEXINIT packet (CVE-2015-1782)
|