Commit Graph

6 Commits

Author SHA1 Message Date
Peter Müller
31167fb3bb libssh: Update to 0.10.6
Please refer to https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/
for this version's release announcement.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2024-01-11 11:59:09 +00:00
Adolf Belka
8e93f8a545 libssh: Update to version 0.10.4
- Update from version 0.9.6 to 0.10.4
- Update of rootfile
- Changelog
	version 0.10.4 (released 2022-09-07)
	  * Fixed issues with KDF on big endian
	version 0.10.3 (released 2022-09-05)
	  * Fixed possible infinite loop in known hosts checking
	version 0.10.2 (released 2022-09-02)
	  * Fixed tilde expansion when handling include directives
	  * Fixed building the shared torture library
	  * Made rekey test more robust (fixes running on i586 build systems e.g koji)
	version 0.10.1 (released 2022-08-30)
	  * Fixed proxycommand support
	  * Fixed musl libc support
	version 0.10.0 (released 2022-08-26)
	  * Added support for OpenSSL 3.0
	  * Added support for mbedTLS 3
	  * Added support for Smart Cards  (through openssl pkcs11 engine)
	  * Added support for chacha20-poly1305@openssh.com with libgcrypt
	  * Added support ed25519 keys in PEM files
	  * Added support for sk-ecdsa and sk-ed25519 (server side)
	  * Added support for limiting RSA key sizes and not accepting small one by
	    default
	  * Added support for ssh-agent on Windows
	  * Added ssh_userauth_publickey_auto_get_current_identity() API
	  * Added ssh_vlog() API
	  * Added ssh_send_issue_banner() API
	  * Added ssh_session_set_disconnect_message() API
	  * Added new configuration options:
	    + IdentityAgent
	    + ModuliFile
	  * Provided X11 client example
	  * Disabled DSA support at build time by default (will be removed in the next
	    release)
	  * Deprecated the SCP API!
	  * Deprecated old pubkey, privatekey API
	  * Avoided some needless large stack buffers to minimize memory footprint
	  * Removed support for OpenSSL < 1.0.1
	  * Fixed parsing username@host in login name
	  * Free global init mutex in the destructor on Windows
	  * Fixed PEM parsing in mbedtls to support both legacy and new PKCS8 formats

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-12-26 08:46:30 +00:00
Peter Müller
9a7e4d8506 Switch checksums from MD5 to BLAKE2
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.

While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.

Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.

In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>
2022-04-02 14:19:25 +00:00
Adolf Belka
6cc834c987 libssh: Update to version 0.9.6
- Update from 0.9.3 to 0.9.6
   0.9.4 and 0.9.6 are security releases
- Update rootfile
- Changelog
   libssh 0.9.6 security release
    This is a security release of libssh to address CVE-2021-3634 (moderate impact), a
    possible heap-buffer overflow when rekeying. A workaround exists. More details can be
    found in the advisory.
    In addition the 0.9.6 version addresses some memory leaks in error path, an AEAD
    handshake and some more.
      CVE-2021-3634: Fix possible heap-buffer overflow when rekeying with different key exchange mechanism
      Fix several memory leaks on error paths
      Reset pending_call_state on disconnect
      Fix handshake bug with AEAD ciphers and no HMAC overlap
      Use OPENSSL_CRYPTO_LIBRARIES in CMake
      Ignore request success and failure message if they are not expected
      Support more identity files in configuration
      Avoid setting compiler flags directly in CMake
      Support build directories with special characters
      Include stdlib.h to avoid crash in Windows
      Fix sftp_new_channel constructs an invalid object
      Fix Ninja multiple rules error
      Several tests fixes
   libssh 0.9.5
    The libssh team is happy to announce another bugfix release of libssh as version
    0.9.5. It offers bug fixes for several issues found by our users.
    This includes a fix for CVE-2020-16135, however we do not see how this would be
    exploitable at all. If you find a security bug in libssh please don’t just assign a
    CVE, talk to us first.
      CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232)
      Improve handling of library initialization (T222)
      Fix parsing of subsecond times in SFTP (T219)
      Make the documentation reproducible
      Remove deprecated API usage in OpenSSL
      Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN
      Define version in one place (T226)
      Prevent invalid free when using different C runtimes than OpenSSL (T229)
      Compatibility improvements to testsuite
   libssh 0.9.4 security release
    This is a security release of libssh to address CVE-2020-1730 (moderate impact), a
    possible Denial of Service (DoS) in client and server when handling AES-CTR keys with
    OpenSSL. A workaround exists. More details can be found in the advisory.
    In addition the this version addresses several memory leaks and adds support for
    diffie-hellman-group14-sha256 key exchange.
      Fixed CVE-2020-1730 (Possible DoS in client and server when handling AES-CTR keys with OpenSSL)
      Added diffie-hellman-group14-sha256
      Fixed several possible memory leaks

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 16:57:06 +00:00
Erik Kapfer
5b9e7d37c3 libssh: Update to version 0.9.3 .
Fixes CVE-2019-14889 and several issues after an security audit.
The complete changelog can be found in here --> https://www.libssh.org/category/release/ .
This version is also needed for tshark-3.2.2 to prevent
'error while loading shared libraries: libssh.so.4' for sshdump and ciscodump.

Signed-off-by: Erik Kapfer <erik.kapfer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-03-21 16:03:54 +00:00
Michael Tremer
1df47cc9ee libssh: New package
This is required by Bird to support RPKI.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-10-08 18:19:33 +00:00