| Name: | openssh |
|---|---|
| Version: | 9.9p1 |
| Release: | 11.0.1.el10 |
| Architecture: | x86_64 |
| Group: | Unspecified |
| Size: | 1452235 |
| License: | BSD-3-Clause AND BSD-2-Clause AND ISC AND SSH-OpenSSH AND ssh-keyscan AND sprintf AND LicenseRef-Fedora-Public-Domain AND X11-distribute-modifications-variant |
| RPM: | openssh-9.9p1-11.0.1.el10.x86_64.rpm |
| Source RPM: | openssh-9.9p1-11.0.1.el10.src.rpm |
| Build Date: | Wed Sep 10 2025 |
| Build Host: | build-ol10-x86_64.oracle.com |
| Vendor: | Oracle America |
| URL: | http://www.openssh.com/portable.html |
| Summary: | An open source implementation of SSH protocol version 2 |
| Description: | SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. |
- Upstream references found with /usr/bin/ssh [Orabug: 37824421]
- Move the redhat help message to debug1 log level Resolves: RHEL-93957
- Support for authentication indicators in OpenSSH Resolves: RHEL-40790
- CVE-2025-32728: Fix logic error in DisableForwarding option Resolves: RHEL-86819 - Provide better error for non-supported private keys Resolves: RHEL-68124 - Ignore bad hostkeys in known_hosts file Resolves: RHEL-83644
- OpenSSH should not use its own implementation of MLKEM Resolves: RHEL-58252 - Correct processing of Compression directive Resolves: RHEL-68346 - Supress systemd warning Resolves: RHEL-84816
- rebuilt Related: RHEL-78699
- Fix regression of Match directive processing Related: RHEL-76317 - Fix missing error codes set and invalid error code checks in OpenSSH. It prevents memory exhaustion attack and a MITM attack when VerifyHostKeyDNS is on (CVE-2025-26465, CVE-2025-26466). Resolves: RHEL-78699 Resolves: RHEL-78943
- Fix regression of Match directive processing Resolves: RHEL-76317 - Avoid linking issues for openssl logging Related: RHEL-63190
- Bump release for October 2024 mass rebuild: Resolves: RHEL-64018
- Fix MLKEM for BE platforms Related: RHEL-60564