Name: | openssh |
---|---|
Version: | 8.0p1 |
Release: | 16.el8 |
Architecture: | x86_64 |
Group: | Applications/Internet |
Size: | 1918049 |
License: | BSD |
RPM: | openssh-8.0p1-16.el8.x86_64.rpm |
Source RPM: | openssh-8.0p1-16.el8.src.rpm |
Build Date: | Sun Oct 02 2022 |
Build Host: | build-ol8-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://www.openssh.com/portable.html |
Summary: | An open source implementation of SSH protocol version 2 |
Description: | SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. |
- Omit client side from minimize-sha1-use.patch to prevent regression (#2093897)
- Fix new issues found by static analyzers
- Upstream: add a local implementation of BSD realpath() for sftp-server (#2064249) - Change product name from Fedora to RHEL in openssh-7.8p1-UsePAM-warning.patch (#1953807) - Include caveat for crypto-policy in sshd manpage (#2044354) - Change log level of FIPS specific log message to verbose (#2050511) - Clarify force_file_perms (-m) documentation in sftp-server manpage (#1862504) - Minimize the use of SHA1 as a proof of possession for RSA key (#2093897)
- Upstream: ClientAliveCountMax=0 disable the connection killing behaviour (#2015828)
- Add support for "Include" directive in sshd_config file (#1926103)
- CVE-2021-41617 upstream fix (#2008885)
- sshd -T requires -C when "Match" is used in sshd_config (#1836277)
- CVE-2020-14145 openssh: Observable Discrepancy leading to an information leak in the algorithm negotiation (#1882252) - Hostbased ssh authentication fails if session ID contains a '/' (#1944125)
- ssh doesn't restore the blocking mode on standard output (#1942901)
- SFTP sort upon the modification time (#1909988) - ssh-keygen printing fingerprint issue with Windows keys (#1901518) - PIN is lost when iterating over tokens when adding pkcs11 keys to ssh-agent (#1843372) - ssh-agent segfaults during ssh-add -s pkcs11 (#1868996) - ssh-copy-id could not resolve ipv6 address ends with colon (#1933517) - sshd provides PAM an incorrect error code (#1879503)