mirror of
https://git.libssh.org/projects/libssh.git
synced 2026-02-11 18:50:28 +09:00
Copy changelog + ABI files from last minor releases
Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Pavol Žáčik <pzacik@redhat.com>
This commit is contained in:
52
CHANGELOG
52
CHANGELOG
@@ -1,6 +1,58 @@
|
||||
CHANGELOG
|
||||
=========
|
||||
|
||||
version 0.11.4 (released 2026-02-10)
|
||||
* Security:
|
||||
* CVE-2025-14821: libssh loads configuration files from the C:\etc directory
|
||||
on Windows
|
||||
* CVE-2026-0964: SCP Protocol Path Traversal in ssh_scp_pull_request()
|
||||
* CVE-2026-0965: Possible Denial of Service when parsing unexpected
|
||||
configuration files
|
||||
* CVE-2026-0966: Buffer underflow in ssh_get_hexa() on invalid input
|
||||
* CVE-2026-0967: Specially crafted patterns could cause DoS
|
||||
* CVE-2026-0968: OOB Read in sftp_parse_longname()
|
||||
* libssh-2026-sftp-extensions: Read buffer overrun when handling SFTP
|
||||
extensions
|
||||
* Stability and compatibility improvements of ProxyJump
|
||||
|
||||
version 0.11.3 (released 2025-09-09)
|
||||
* Security:
|
||||
* CVE-2025-8114: Fix NULL pointer dereference after allocation failure
|
||||
* CVE-2025-8277: Fix memory leak of ephemeral key pair during repeated wrong KEX
|
||||
* Potential UAF when send() fails during key exchange
|
||||
* Fix possible timeout during KEX if client sends authentication too early (#311)
|
||||
* Cleanup OpenSSL PKCS#11 provider when loaded
|
||||
* Zeroize buffers containing private key blobs during export
|
||||
|
||||
version 0.11.2 (released 2025-06-24)
|
||||
* Security:
|
||||
* CVE-2025-4877 - Write beyond bounds in binary to base64 conversion
|
||||
* CVE-2025-4878 - Use of uninitialized variable in privatekey_from_file()
|
||||
* CVE-2025-5318 - Likely read beyond bounds in sftp server handle management
|
||||
* CVE-2025-5351 - Double free in functions exporting keys
|
||||
* CVE-2025-5372 - ssh_kdf() returns a success code on certain failures
|
||||
* CVE-2025-5449 - Likely read beyond bounds in sftp server message decoding
|
||||
* CVE-2025-5987 - Invalid return code for chacha20 poly1305 with OpenSSL
|
||||
* Compatibility
|
||||
* Fixed compatibility with CPM.cmake
|
||||
* Compatibility with OpenSSH 10.0
|
||||
* Tests compatibility with new Dropbear releases
|
||||
* Removed p11-kit remoting from the pkcs11 testsuite
|
||||
* Bugfixes
|
||||
* Implement missing packet filter for DH GEX
|
||||
* Properly process the SSH2_MSG_DEBUG message
|
||||
* Allow escaping quotes in quoted arguments to ssh configuration
|
||||
* Do not fail with unknown match keywords in ssh configuration
|
||||
* Process packets before selecting signature algorithm during authentication
|
||||
* Do not fail hard when the SFTP status message is not sent by noncompliant
|
||||
servers
|
||||
|
||||
version 0.11.1 (released 2024-08-30)
|
||||
* Fixed default TTY modes that are set when stdin is not connected to tty (#270)
|
||||
* Fixed zlib cleanup procedure, which could crash on i386
|
||||
* Various test fixes improving their stability
|
||||
* Fixed cygwin build
|
||||
|
||||
version 0.11.0 (released 2024-07-31)
|
||||
* Deprecations and Removals:
|
||||
* Dropped support for DSA
|
||||
|
||||
Reference in New Issue
Block a user