Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: openssh | Distribution: CentOS |
Version: 8.7p1 | Vendor: CentOS |
Release: 45.el9 | Build date: Tue Feb 18 12:00:30 2025 |
Group: Unspecified | Build host: ppc64le-03.stream.rdu2.redhat.com |
Size: 2114404 | Source RPM: openssh-8.7p1-45.el9.src.rpm |
Packager: [email protected] | |
Url: http://www.openssh.com/portable.html | |
Summary: An open source implementation of SSH protocol version 2 |
SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both.
BSD
* Tue Feb 18 2025 Dmitry Belyavskiy <[email protected]> - 8.7p1-45 - Fix missing error codes set and invalid error code checks in OpenSSH. It prevents memory exhaustion attack and a MITM attack when VerifyHostKeyDNS is on (CVE-2025-26465). Resolves: RHEL-78700 * Mon Oct 21 2024 Dmitry Belyavskiy <[email protected]> - 8.7p1-44 - Add extra help information on ssh early failure Resolves: RHEL-33809 - Provide details on crypto error instead of "error in libcrypto" Resolves: RHEL-52293 - Allow duplicate Subsystem directive Resolves: RHEL-47112 * Tue Jul 09 2024 Dmitry Belyavskiy <[email protected]> - 8.7p1-43 - Possible remote code execution due to a race condition (CVE-2024-6409) Resolves: RHEL-45741 * Thu Jul 04 2024 Dmitry Belyavskiy <[email protected]> - 8.7p1-42 - Possible remote code execution due to a race condition (CVE-2024-6387) Resolves: RHEL-45348 * Mon Jun 03 2024 Dmitry Belyavskiy <[email protected]> - 8.7p1-41 - Fix ssh multiplexing connect timeout processing Resolves: RHEL-37748 * Thu May 02 2024 Zoltan Fridrich <[email protected]> - 8.7p1-40 - Correctly audit hostname and IP address Resolves: RHEL-22316 - Make default key sizes configurable in sshd-keygen Resolves: RHEL-26454 * Wed Apr 24 2024 Dmitry Belyavskiy <[email protected]> - 8.7p1-39 - Use FIPS-compatible API for key derivation Resolves: RHEL-32809 * Fri Jan 05 2024 Dmitry Belyavskiy <[email protected]> - 8.7p1-38 - Fix Terrapin attack Resolves: CVE-2023-48795 * Fri Jan 05 2024 Dmitry Belyavskiy <[email protected]> - 8.7p1-37 - Fix Terrapin attack Resolves: CVE-2023-48795 * Wed Dec 20 2023 Dmitry Belyavskiy <[email protected]> - 8.7p1-36 - Fix Terrapin attack Resolves: CVE-2023-48795 - Relax OpenSSH build-time checks for OpenSSL version Related: RHEL-4734 - Forbid shell metasymbols in username/hostname Resolves: CVE-2023-51385 * Mon Oct 23 2023 Dmitry Belyavskiy <[email protected]> - 8.7p1-35 - Relax OpenSSH checks for OpenSSL version Resolves: RHEL-4734 - Limit artificial delays in sshd while login using AD user Resolves: RHEL-2469 - Move users/groups creation logic to sysusers.d fragments Resolves: RHEL-5222 * Thu Jul 20 2023 Dmitry Belyavskiy <[email protected]> - 8.7p1-34 - Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408 * Tue Jun 13 2023 Dmitry Belyavskiy <[email protected]> - 8.7p1-33 - Allow specifying validity interval in UTC Resolves: rhbz#2115043 * Wed May 24 2023 Norbert Pocs <[email protected]> - 8.7p1-32 - Fix pkcs11 issue with the recent changes - Delete unnecessary log messages from previous compl-dh patch - Add ssh_config man page explanation on rhbz#2068423 - Resolves: rhbz#2207793, rhbz#2209096 * Tue May 16 2023 Norbert Pocs <[email protected]> - 8.7p1-31 - Fix minor issues with openssh-8.7p1-evp-fips-compl-dh.patch: - Check return values - Use EVP API to get the size of DH - Add some log debug lines - Related: rhbz#2091694 * Thu Apr 20 2023 Dmitry Belyavskiy <[email protected]> - 8.7p1-30 - Some non-terminating processes were listening on ports. Resolves: rhbz#2177768 - On sshd startup, we check whether signing using the SHA1 for signing is available and don't use it when it isn't. - On ssh private key conversion we explicitly use SHA2 for testing RSA keys. - In sshd, when SHA1 signatures are unavailable, we fallback (fall forward :) ) to SHA2 on host keys proof confirmation. - On a client side we permit SHA2-based proofs from server when requested SHA1 proof (or didn't specify the hash algorithm that implies SHA1 on the client side). It is aligned with already present exception for RSA certificates. - We fallback to SHA2 if SHA1 signatures is not available on the client side (file sshconnect2.c). - We skip dss-related tests (they don't work without SHA1). Resolves: rhbz#2070163 - FIPS compliance efforts for dh, ecdh and signing Resolves: rhbz#2091694 * Thu Apr 06 2023 Dmitry Belyavskiy <[email protected]> - 8.7p1-29 - Resolve possible self-DoS with some clients Resolves: rhbz#2186473
/etc/ssh /etc/ssh/moduli /usr/bin/ssh-keygen /usr/lib/.build-id /usr/lib/.build-id/b1 /usr/lib/.build-id/b1/6cfb55b7990f6e66e13445c21ee9324cf39413 /usr/lib/.build-id/ed /usr/lib/.build-id/ed/cf342c4796496936458abcab79f872058c8ab8 /usr/lib/sysusers.d/openssh.conf /usr/libexec/openssh /usr/libexec/openssh/ssh-keysign /usr/share/doc/openssh /usr/share/doc/openssh/CREDITS /usr/share/doc/openssh/ChangeLog /usr/share/doc/openssh/OVERVIEW /usr/share/doc/openssh/PROTOCOL /usr/share/doc/openssh/PROTOCOL.agent /usr/share/doc/openssh/PROTOCOL.certkeys /usr/share/doc/openssh/PROTOCOL.chacha20poly1305 /usr/share/doc/openssh/PROTOCOL.cve-2023-48795 /usr/share/doc/openssh/PROTOCOL.key /usr/share/doc/openssh/PROTOCOL.krl /usr/share/doc/openssh/PROTOCOL.mux /usr/share/doc/openssh/PROTOCOL.sshsig /usr/share/doc/openssh/PROTOCOL.u2f /usr/share/doc/openssh/README /usr/share/doc/openssh/README.dns /usr/share/doc/openssh/README.platform /usr/share/doc/openssh/README.privsep /usr/share/doc/openssh/README.tun /usr/share/doc/openssh/TODO /usr/share/licenses/openssh /usr/share/licenses/openssh/LICENCE /usr/share/man/man1/ssh-keygen.1.gz /usr/share/man/man8/ssh-keysign.8.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Feb 26 06:43:45 2025