Пакет openssh-8.7p1-47.el9_7.inferit.aarch64
| Имя | openssh |
|---|---|
| Эпоха | 0 |
| Версия | 8.7p1 |
| Релиз | 47.el9_7.inferit |
| Архитектура | aarch64 |
| Сайт | http://www.openssh.com/portable.html |
| Лицензия | BSD |
| Время сборки | 2025-12-18 13:00:40 |
| Хост сборки | builder-arm64-1.inferitos.ru |
| Краткое описание | An open source implementation of SSH protocol version 2 |
| Репозитории | BaseOS |
| Полное описание | SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. |
| Эррата | — |
| Размер | 450 КиБ |
| Исходный проект | openssh-8.7p1-47.el9_7.inferit |
| Контрольная сумма SHA-256 | 41ccf04edda15d8eb4042de9ac77e68d481eb5a1c8b8054409ac06fa98b93834 |
×
* Thu Dec 18 2025 Arkady L. Shane <tigro@msvsphere-os.ru> - 8.7p1-47.inferit - Added BR: openssl-devel-engine - redirect message to docs.msvsphere-os.ru - Secure Fixes (INF-1950, INF-1951) * Tue Dec 09 2025 Zoltan Fridrich <zfridric@redhat.com> - 8.7p1-47 - CVE-2025-61984: Reject usernames with control characters Resolves: RHEL-128401 - CVE-2025-61985: Reject URL-strings with NULL characters Resolves: RHEL-128392 * Thu Nov 13 2025 Victor Evdokimov <viktor.evdokimov@softline.com> - 8.7p1-46.inferit.1 - Fixed memory leak in function sshd_selinux_change_privsep_preauth_context: memleak--preauth_context.patch * Mon Oct 27 2025 Victor Evdokimov <viktor.evdokimov@softline.com> - 8.7p1-46.inferit - Fixed null pointer using in function sshsk_sign: null-ptr-in-sshsk_sign.patch - Fixed null pointer using in function process_escapes: null-ptr-in-process_escapes.patch - Fixed extra malloc in function channel_request_remote_forwarding: extra-malloc-in-channel_request_remote_forwarding.patch - Fixed memory leak in function tilde_expand: memory-leak-in-tilde_expand.patch - Fixed too big memory allocation: calloc-size.patch - Corrected array size for function pdf_gen_xor: array-size--pdf_gen_xor.patch * Mon Jul 21 2025 Zoltan Fridrich <zfridric@redhat.com> - 8.7p1-46 - Move the redhat help message to debug1 log level Resolves: RHEL-104580 * Tue Feb 18 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-45 - Fix missing error codes set and invalid error code checks in OpenSSH. It prevents memory exhaustion attack and a MITM attack when VerifyHostKeyDNS is on (CVE-2025-26465). Resolves: RHEL-78700 * Mon Oct 21 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-44 - Add extra help information on ssh early failure Resolves: RHEL-33809 - Provide details on crypto error instead of "error in libcrypto" Resolves: RHEL-52293 - Allow duplicate Subsystem directive Resolves: RHEL-47112 * Tue Jul 09 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-43 - Possible remote code execution due to a race condition (CVE-2024-6409) Resolves: RHEL-45741 * Thu Jul 04 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-42 - Possible remote code execution due to a race condition (CVE-2024-6387) Resolves: RHEL-45348 * Mon Jun 03 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-41 - Fix ssh multiplexing connect timeout processing Resolves: RHEL-37748