Package: python-asyncssh / 2.10.1-2+deb12u2
Metadata
Package | Version | Patches format |
---|---|---|
python-asyncssh | 2.10.1-2+deb12u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
sphinx use default theme.patch | (download) |
docs/rftheme/static/rftheme.css_t |
2 1 + 1 - 0 ! |
make sphinx use default theme |
0002 skip tests requiring network access.patch | (download) |
tests/test_auth_keys.py |
1 1 + 0 - 0 ! |
skip tests requiring network access |
0003 Revert fido 0.9.2 support.patch | (download) |
asyncssh/sk.py |
2 1 + 1 - 0 ! |
revert fido 0.9.2 support Not yet in Debian, we're still on 0.9.1 This reverts: 7a4597953a631ee5091ac1b6e384e32d4f018a82 |
0004 Handle ConnectionRefusedError when connecting to 223.patch | (download) |
tests/test_connection.py |
23 16 + 7 - 0 ! |
handle connectionrefusederror when connecting to 223.255.255.254 If the tests are run from an environment with a firewall, they may be refused instead of timing out. Just skip the test. |
mock pathlib expanduser.patch | (download) |
tests/test_config.py |
6 5 + 1 - 0 ! |
[patch] also patch pathlib expanduser NB: with recent Python versions the existing `os.path.expanduser()` patch also affects `pathlib.path.expanduser()` which is invoked by the config parser for expanding `~/.ssh`. |
CVE 2023 48795.patch | (download) |
asyncssh/connection.py |
65 53 + 12 - 0 ! |
--- |
CVE 2023 46445 and CVE 2023 46446.patch | (download) |
asyncssh/connection.py |
132 83 + 49 - 0 ! |
[patch] harden asyncssh state machine against message injection during handshake MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit This commit puts additional restrictions on when messages are accepted during the SSH handshake to avoid message injection attacks from a rogue client or server. More detailed information will be available in CVE-2023-46445 and CVE-2023-46446, to be published shortly. Thanks go to Fabian Bumer, Marcus Brinkmann, and Jrg Schwenk for identifying and reporting these vulnerabilities and providing detailed analysis and suggestions for how to protect against them, as well as review comments on the proposed fix. |