GitLab Commit is coming up on August 3-4. Learn how to innovate together using GitLab, the DevOps platform. Register for free:

Tags give the ability to mark specific points in history as being important
This project is mirrored from Pull mirroring updated .
  • libssh-0.9.5 protected   libssh-0.9.5 * CVE-2020-16135: Avoid null pointer dereference in sftpserver (T232) * Improve handling of library initialization (T222) * Fix parsing of subsecond times in SFTP (T219) * Make the documentation reproducible * Remove deprecated API usage in OpenSSL * Fix regression of ssh_channel_poll_timeout() returning SSH_AGAIN * Define version in one place (T226) * Prevent invalid free when using different C runtimes than OpenSSL (T229) * Compatibility improvements to testsuite
    0cceefd4 · Bump version to 0.9.5 ·
  • libssh-0.8.9 protected   libssh-0.8.9 * Fixed CVE-2020-1730 - Possible DoS in client and server when handling AES-CTR keys with OpenSSL
    04685a74 · Bump version to 0.8.9 ·
  • libssh-0.9.4 protected   libssh-0.9.4 * Fixed CVE-2020-1730 - Possible DoS in client and server when handling AES-CTR keys with OpenSSL * Added diffie-hellman-group14-sha256 * Fixed serveral possible memory leaks
    9e9df612 · Bump version to 0.9.4 ·
  • libssh-0.8.8 protected   libssh-0.8.8 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution
    78503072 · Bump version to 0.8.8 ·
  • libssh-0.9.3 protected   libssh-0.9.3 * Fixed CVE-2019-14889 - SCP: Unsanitized location leads to command execution * SSH-01-003 Client: Missing NULL check leads to crash in erroneous state * SSH-01-006 General: Various unchecked Null-derefs cause DOS * SSH-01-007 PKI Gcrypt: Potential UAF/double free with RSA pubkeys * SSH-01-010 SSH: Deprecated hash function in fingerprinting * SSH-01-013 Conf-Parsing: Recursive wildcards in hostnames lead to DOS * SSH-01-014 Conf-Parsing: Integer underflow leads to OOB array access * SSH-01-001 State Machine: Initial machine states should be set explicitly * SSH-01-002 Kex: Differently bound macros used to iterate same array * SSH-01-005 Code-Quality: Integer sign confusion during assignments * SSH-01-008 SCP: Protocol Injection via unescaped File Names * SSH-01-009 SSH: Update documentation which RFCs are implemented * SSH-01-012 PKI: Information leak via uninitialized stack buffer
    64ce53fd · Bump version to 0.9.3 ·
  • libssh-0.9.2 protected   libssh-0.9.2 * Fixed libssh-config.cmake * Fixed issues with rsa algorithm negotiation (T191) * Fixed detection of OpenSSL ed25519 support (T197)
  • libssh-0.9.1 protected   libssh-0.9.1 * Added support for Ed25519 via OpenSSL * Added support for X25519 via OpenSSL * Added support for localuser in Match keyword * Fixed Match keyword to be case sensitive * Fixed compilation with LibreSSL * Fixed error report of channel open (T75) * Fixed sftp documentation (T137) * Fixed known_hosts parsing (T156) * Fixed build issue with MinGW (T157) * Fixed build with gcc 9 (T164) * Fixed deprecation issues (T165) * Fixed known_hosts directory creation (T166)
  • libssh-0.9.0 protected   libssh-0.9.0 * Added support for AES-GCM * Added improved rekeying support * Added performance improvements * Disabled blowfish support by default * Fixed several ssh config parsing issues * Added support for DH Group Exchange KEX * Added support for Encrypt-then-MAC mode * Added support for parsing server side configuration file * Added support for ECDSA/Ed25519 certificates * Added FIPS 140-2 compatibility * Improved known_hosts parsing * Improved documentation * Improved OpenSSL API usage for KEX, DH, and signatures
    79900e52 · Bump version to 0.9.0 ·
  • libssh-0.8.7 protected   libssh-0.8.7 * Fixed handling extension flags in the server implementation * Fixed exporting ed25519 private keys * Fixed corner cases for rsa-sha2 signatures * Fixed some issues with connector
    52986115 · Bump version to 0.8.7 ·
  • libssh-0.8.6 protected   libssh-0.8.6 * Fixed compilation issues with different OpenSSL versions * Fixed StrictHostKeyChecking in new knownhosts API * Fixed ssh_send_keepalive() with packet filter * Fixed possible crash with knownhosts options * Fixed issus with rekeying * Fixed strong ECDSA keys * Fixed some issues with rsa-sha2 extentions * Fixed access violation in ssh_init() (static linking) * Fixed ssh_channel_close() handling
    68fc17ca · Bump version to 0.8.6 ·
  • libssh-0.7.7 protected   libssh-0.7.7 * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed a memory leak with OpenSSL
    64a2d37c · Bump version to 0.7.7 ·
  • libssh-0.8.5 protected   libssh-0.8.5 * Added support to get known_hosts locations with ssh_options_get() * Fixed preferred algorithm for known hosts negotiations * Fixed KEX with some server implementations (e.g. Cisco) * Fixed issues with MSVC * Fixed keyboard-interactive auth in server mode (regression from CVE-2018-10933) * Fixed gssapi auth in server mode (regression from CVE-2018-10933) * Fixed socket fd handling with proxy command * Fixed a memory leak with OpenSSL
    273fb4cf · Bump version to 0.8.5 ·
  • libssh-0.7.6 protected   libssh-0.7.6 * Fixed CVE-2018-10933 * Added support for OpenSSL 1.1 * Added SHA256 support for ssh_get_publickey_hash() * Fixed config parsing * Fixed random memory corruption when importing pubkeys
    c20b360c · Bump version to 0.7.6 ·
  • libssh-0.8.4 protected   libssh-0.8.4 * Fixed CVE-2018-10933 * Fixed building without globbing support * Fixed possible memory leaks * Avoid SIGPIPE on sockets
    789df0b7 · Bump version to 0.8.4 ·
  • libssh-0.8.3 protected   libssh-0.8.3 * Added support for rsa-sha2 * Added support to parse private keys in openssh container format (other than ed25519) * Added support for diffie-hellman-group18-sha512 and diffie-hellman-group16-sha512 * Added ssh_get_fingerprint_hash() * Added ssh_pki_export_privkey_base64() * Added support for Match keyword in config file * Improved performance and reduced memory footprint for sftp * Fixed ecdsa publickey auth * Fixed reading a closed channel * Added support to announce and in the sftp server
    c91f5306 · Bump version to 0.8.3 ·
  • libssh-0.8.2 protected   libssh-0.8.2
    efdd567a · Bump version to 0.8.2 ·
  • libssh-0.8.1 protected   libssh-0.8.1
    e949e135 · Bump version to 0.8.1 ·
  • libssh-0.8.0 protected   libssh-0.8.0
  • libssh-0.7.5 protected   libssh-0.7.5
    0588cbf9 · Bump version to 0.7.5 ·
  • libssh-0.7.4 protected   libssh-0.7.4
    8a2deeb3 · Bump version to 0.7.4 ·