Name: | openssh |
---|---|
Version: | 8.0p1 |
Release: | 17.el8 |
Architecture: | aarch64 |
Group: | Applications/Internet |
Size: | 1967273 |
License: | BSD |
RPM: | openssh-8.0p1-17.el8.aarch64.rpm |
Source RPM: | openssh-8.0p1-17.el8.src.rpm |
Build Date: | Fri Mar 31 2023 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.openssh.com/portable.html |
Summary: | An open source implementation of SSH protocol version 2 |
Description: | SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. |
- Fix parsing of IPv6 IPs in sftp client (#2151334) - Avoid ssh banner one-byte overflow (#2138344) - Avoid crash of sshd when Include folder does not exist (#2133087)
- Omit client side from minimize-sha1-use.patch to prevent regression (#2093897)
- Fix new issues found by static analyzers
- Upstream: add a local implementation of BSD realpath() for sftp-server (#2064249) - Change product name from Fedora to RHEL in openssh-7.8p1-UsePAM-warning.patch (#1953807) - Include caveat for crypto-policy in sshd manpage (#2044354) - Change log level of FIPS specific log message to verbose (#2050511) - Clarify force_file_perms (-m) documentation in sftp-server manpage (#1862504) - Minimize the use of SHA1 as a proof of possession for RSA key (#2093897)
- Upstream: ClientAliveCountMax=0 disable the connection killing behaviour (#2015828)
- Add support for "Include" directive in sshd_config file (#1926103)
- CVE-2021-41617 upstream fix (#2008885)
- sshd -T requires -C when "Match" is used in sshd_config (#1836277)
- CVE-2020-14145 openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation (#1882252) - Hostbased ssh authentication fails if session ID contains a '/' (#1944125)
- ssh doesn't restore the blocking mode on standard output (#1942901)