19838d46ba
version 0.9.3 (released 2019-12-10) * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer
15 lines
434 B
Text
15 lines
434 B
Text
@comment $NetBSD: PLIST,v 1.15 2019/12/31 12:27:03 wiz Exp $
|
|
include/libssh/callbacks.h
|
|
include/libssh/legacy.h
|
|
include/libssh/libssh.h
|
|
include/libssh/libsshpp.hpp
|
|
include/libssh/server.h
|
|
include/libssh/sftp.h
|
|
include/libssh/ssh2.h
|
|
lib/cmake/libssh/libssh-config-noconfig.cmake
|
|
lib/cmake/libssh/libssh-config-version.cmake
|
|
lib/cmake/libssh/libssh-config.cmake
|
|
lib/libssh.so
|
|
lib/libssh.so.4
|
|
lib/libssh.so.4.8.4
|
|
lib/pkgconfig/libssh.pc
|