[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет openssh-8.7p1-45.el9.src download

Имя openssh
Эпоха 0
Версия 8.7p1
Релиз 45.el9
Архитектура src
Сайт http://www.openssh.com/portable.html
Лицензия BSD
Время сборки 2025-03-31 16:25:24
Хост сборки builder-iso-x86-01.inferitos.ru
Краткое описание An open source implementation of SSH protocol version 2
Репозитории BaseOS
Полное описание SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both.
Эррата
Размер 2360 КиБ
Исходный проект openssh-8.7p1-45.el9
Контрольная сумма SHA-256 08bee8432fd8a8713e9807364a344ac80bc65d999d6ab43760ac091001de11b9
× Full screenshot
История изменений link
* Tue Feb 18 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-45
- Fix missing error codes set and invalid error code checks in OpenSSH. It
  prevents memory exhaustion attack and a MITM attack when VerifyHostKeyDNS
  is on (CVE-2025-26465).
  Resolves: RHEL-78700

* Mon Oct 21 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-44
- Add extra help information on ssh early failure
  Resolves: RHEL-33809
- Provide details on crypto error instead of "error in libcrypto"
  Resolves: RHEL-52293
- Allow duplicate Subsystem directive
  Resolves: RHEL-47112

* Tue Jul 09 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-43
- Possible remote code execution due to a race condition (CVE-2024-6409)
  Resolves: RHEL-45741

* Thu Jul 04 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-42
- Possible remote code execution due to a race condition (CVE-2024-6387)
  Resolves: RHEL-45348

* Mon Jun 03 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-41
- Fix ssh multiplexing connect timeout processing
  Resolves: RHEL-37748

* Thu May 02 2024 Zoltan Fridrich <zfridric@redhat.com> - 8.7p1-40
- Correctly audit hostname and IP address
  Resolves: RHEL-22316
- Make default key sizes configurable in sshd-keygen
  Resolves: RHEL-26454

* Wed Apr 24 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-39
- Use FIPS-compatible API for key derivation
  Resolves: RHEL-32809

* Fri Jan 05 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-38
- Fix Terrapin attack
  Resolves: CVE-2023-48795

* Fri Jan 05 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-37
- Fix Terrapin attack
  Resolves: CVE-2023-48795

* Wed Dec 20 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-36
- Fix Terrapin attack
  Resolves: CVE-2023-48795
- Relax OpenSSH build-time checks for OpenSSL version
  Related: RHEL-4734
- Forbid shell metasymbols in username/hostname
  Resolves: CVE-2023-51385