saltbundlepy-paramiko
No description set
- Sources inherited from project systemsmanagement:saltstack:bundle
-
16
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout systemsmanagement:saltstack:bundle:CentOS8/saltbundlepy-paramiko && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
add-support-for-new-OpenSSH-private-key-format.pat |
0000022781 22.2 KB | |
cert_support.tar.gz | 0000004970 4.85 KB | |
disable-gssapi.patch | 0000000423 423 Bytes | |
paramiko-2.4.2.tar.gz | 0001207299 1.15 MB | |
paramiko-fix-1169489.patch | 0000000713 713 Bytes | |
paramiko-test_extend_timeout.patch | 0000000542 542 Bytes | |
saltbundlepy-paramiko.changes | 0000033125 32.3 KB | |
saltbundlepy-paramiko.spec | 0000003790 3.7 KB | |
support-cryptography-25-and-above.patch | 0000007080 6.91 KB |
Revision 1 (latest revision is 28)
Victor Zhestkov (vzhestkov)
committed
(revision 1)
- Add support-cryptography-25-and-above.patch: * Since SLE15 SP1 and above have cryptography 2.8, stop using deprecated methods, and update the required version. (bsc#1178341) - paramiko-fix-1169489.patch: fixed fallout from last patch (bsc#1169489) - add-support-for-new-OpenSSH-private-key-format.patch: Add support for new OpenSSH >= 7.8p1 private key format (bsc#1166758) - add disable-gssapi.patch - workaround for boo#1115769 - update to 2.4.2 - refresh paramiko-test_extend_timeout.patch * Fix exploit (CVE pending) in Paramiko's server mode (not client mode) where hostile clients could trick the server into thinking they were authenticated without actually submitting valid authentication. * Modify protocol message handling such that Transport does not respond to MSG_UNIMPLEMENTED with its own MSG_UNIMPLEMENTED * Updated SSHConfig.lookup <paramiko.config.SSHConfig.lookup> so it returns a new, type-casting-friendly dict subclass (~paramiko.config.SSHConfigDict) in lieu of dict literals. - add paramiko-test_extend_timeout.patch (bsc#1085529) extend timeout in testsuite to pass on ppc64le update to version 2.4.1 (bsc#1085276, CVE-2018-7750): * changelog: update for #1039 / #1051 * Screen off dev version of Python from test matrix * ensure ed25519 password is bytes * Cut 2.0.8
Comments 0