Secure Shell Client and Server (Remote Login Program)

Edit Package openssh

Devel package for openssh

Refresh
Refresh
Source Files
Filename Size Changed
README.FIPS 0000003276 3.2 KB
README.SUSE 0000000690 690 Bytes
README.kerberos 0000000528 528 Bytes
_multibuild 0000000070 70 Bytes
cavs_driver-ssh.pl 0000005408 5.28 KB
fix-missing-lz.patch 0000001556 1.52 KB
openssh-7.7p1-IPv6_X_forwarding.patch 0000001228 1.2 KB
openssh-7.7p1-X11_trusted_forwarding.patch 0000001739 1.7 KB
openssh-7.7p1-X_forward_with_disabled_ipv6.patch 0000000829 829 Bytes
openssh-7.7p1-cavstest-ctr.patch 0000007984 7.8 KB
openssh-7.7p1-cavstest-kdf.patch 0000014404 14.1 KB
openssh-7.7p1-disable_openssl_abi_check.patch 0000001544 1.51 KB
openssh-7.7p1-eal3.patch 0000000845 845 Bytes
openssh-7.7p1-enable_PAM_by_default.patch 0000000681 681 Bytes
openssh-7.7p1-fips.patch 0000024520 23.9 KB
openssh-7.7p1-fips_checks.patch 0000011792 11.5 KB
openssh-7.7p1-host_ident.patch 0000000774 774 Bytes
openssh-7.7p1-hostname_changes_when_forwarding_X.patch 0000002583 2.52 KB
openssh-7.7p1-ldap.patch 0000086791 84.8 KB
openssh-7.7p1-no_fork-no_pid_file.patch 0000000644 644 Bytes
openssh-7.7p1-pam_check_locks.patch 0000004862 4.75 KB
openssh-7.7p1-pts_names_formatting.patch 0000001043 1.02 KB
openssh-7.7p1-remove_xauth_cookies_on_exit.patch 0000001294 1.26 KB
openssh-7.7p1-seccomp_ipc_flock.patch 0000001462 1.43 KB
openssh-7.7p1-seccomp_stat.patch 0000000610 610 Bytes
openssh-7.7p1-send_locale.patch 0000001404 1.37 KB
openssh-7.7p1-sftp_force_permissions.patch 0000004188 4.09 KB
openssh-7.7p1-sftp_print_diagnostic_messages.patch 0000001780 1.74 KB
openssh-7.7p1-systemd-notify.patch 0000002595 2.53 KB
openssh-7.9p1-keygen-preserve-perms.patch 0000001304 1.27 KB
openssh-7.9p1-revert-new-qos-defaults.patch 0000002921 2.85 KB
openssh-8.0p1-gssapi-keyex.patch 0000125099 122 KB
openssh-8.1p1-audit.patch 0000074299 72.6 KB
openssh-8.1p1-ed25519-use-openssl-rng.patch 0000001715 1.67 KB
openssh-8.1p1-seccomp-clock_gettime64.patch 0000000844 844 Bytes
openssh-8.1p1-seccomp-clock_nanosleep.patch 0000000472 472 Bytes
openssh-8.1p1-seccomp-clock_nanosleep_time64.patch 0000000837 837 Bytes
openssh-8.1p1-use-openssl-kdf.patch 0000003878 3.79 KB
openssh-8.4p1-pam_motd.patch 0000000843 843 Bytes
openssh-8.4p1-ssh_config_d.patch 0000001485 1.45 KB
openssh-8.4p1-vendordir.patch 0000007137 6.97 KB
openssh-9.3p1.tar.gz 0001856839 1.77 MB
openssh-9.3p1.tar.gz.asc 0000000833 833 Bytes
openssh-askpass-gnome.changes 0000011678 11.4 KB
openssh-askpass-gnome.spec 0000002134 2.08 KB
openssh-do-not-send-empty-message.patch 0000000685 685 Bytes
openssh-fips-ensure-approved-moduli.patch 0000001788 1.75 KB
openssh-openssl-3.patch 0000003698 3.61 KB
openssh-reenable-dh-group14-sha1-default.patch 0000001524 1.49 KB
openssh-whitelist-syscalls.patch 0000000927 927 Bytes
openssh.changes 0000258719 253 KB
openssh.keyring 0000022720 22.2 KB
openssh.spec 0000020295 19.8 KB
ssh-askpass 0000000479 479 Bytes
ssh.reg 0000000500 500 Bytes
sshd-gen-keys-start 0000000225 225 Bytes
sshd-sle.pamd 0000000373 373 Bytes
sshd.fw 0000000135 135 Bytes
sshd.pamd 0000000538 538 Bytes
sshd.service 0000000394 394 Bytes
sysconfig.ssh 0000000221 221 Bytes
sysusers-sshd.conf 0000000064 64 Bytes
wtmpdb.patch 0000005130 5.01 KB
Revision 247 (latest revision is 267)
Hans Petter Jansson's avatar Hans Petter Jansson (hpjansson) accepted request 1087770 from Antonio Larrosa's avatar Antonio Larrosa (alarrosa) (revision 247)
- Update to openssh 9.3p1
  * No changes for askpass, see main package changelog for
    details

- Update to openssh 9.3p1:
  = Security
  * ssh-add(1): when adding smartcard keys to ssh-agent(1) with the
   per-hop destination constraints (ssh-add -h ...) added in
   OpenSSH 8.9, a logic error prevented the constraints from being
   communicated to the agent. This resulted in the keys being added
   without constraints. The common cases of non-smartcard keys and
   keys without destination constraints are unaffected. This
   problem was reported by Luci Stanescu.
 * ssh(1): Portable OpenSSH provides an implementation of the
   getrrsetbyname(3) function if the standard library does not
   provide it, for use by the VerifyHostKeyDNS feature. A
   specifically crafted DNS response could cause this function to
   perform an out-of-bounds read of adjacent stack data, but this
   condition does not appear to be exploitable beyond denial-of-
   service to the ssh(1) client.
   The getrrsetbyname(3) replacement is only included if the
   system's standard library lacks this function and portable
   OpenSSH was not compiled with the ldns library (--with-ldns).
   getrrsetbyname(3) is only invoked if using VerifyHostKeyDNS to
   fetch SSHFP records. This problem was found by the Coverity
   static analyzer.
  = New features
  * ssh-keygen(1), ssh-keyscan(1): accept -Ohashalg=sha1|sha256
    when outputting SSHFP fingerprints to allow algorithm
    selection. bz3493
Comments 1

John Doe's avatar

Can you upgrade to 9.6?

openSUSE Build Service is sponsored by