Secure Shell Client and Server (Remote Login Program)

Edit Package openssh

SSH (Secure Shell) is a program for logging into and executing commands
on a remote machine. It is intended to replace rsh (rlogin and rsh) and
provides openssl (secure encrypted communication) between two untrusted
hosts over an insecure network.

xorg-x11 (X Window System) connections and arbitrary TCP/IP ports can
also be forwarded over the secure channel.

Refresh
Refresh
Source Files
Filename Size Changed
README.FIPS 0000003276 3.2 KB
README.SUSE 0000000690 690 Bytes
README.kerberos 0000000528 528 Bytes
_multibuild 0000000070 70 Bytes
cavs_driver-ssh.pl 0000005408 5.28 KB
fix-missing-lz.patch 0000001556 1.52 KB
openssh-7.7p1-IPv6_X_forwarding.patch 0000001228 1.2 KB
openssh-7.7p1-X11_trusted_forwarding.patch 0000001739 1.7 KB
openssh-7.7p1-X_forward_with_disabled_ipv6.patch 0000000829 829 Bytes
openssh-7.7p1-cavstest-ctr.patch 0000007984 7.8 KB
openssh-7.7p1-cavstest-kdf.patch 0000014404 14.1 KB
openssh-7.7p1-disable_openssl_abi_check.patch 0000001544 1.51 KB
openssh-7.7p1-eal3.patch 0000000845 845 Bytes
openssh-7.7p1-enable_PAM_by_default.patch 0000000681 681 Bytes
openssh-7.7p1-fips.patch 0000024520 23.9 KB
openssh-7.7p1-fips_checks.patch 0000011792 11.5 KB
openssh-7.7p1-host_ident.patch 0000000774 774 Bytes
openssh-7.7p1-hostname_changes_when_forwarding_X.patch 0000002583 2.52 KB
openssh-7.7p1-ldap.patch 0000086791 84.8 KB
openssh-7.7p1-no_fork-no_pid_file.patch 0000000644 644 Bytes
openssh-7.7p1-pam_check_locks.patch 0000004862 4.75 KB
openssh-7.7p1-pts_names_formatting.patch 0000001043 1.02 KB
openssh-7.7p1-remove_xauth_cookies_on_exit.patch 0000001294 1.26 KB
openssh-7.7p1-seccomp_ipc_flock.patch 0000001462 1.43 KB
openssh-7.7p1-seccomp_stat.patch 0000000610 610 Bytes
openssh-7.7p1-send_locale.patch 0000001404 1.37 KB
openssh-7.7p1-sftp_force_permissions.patch 0000004188 4.09 KB
openssh-7.7p1-sftp_print_diagnostic_messages.patch 0000001780 1.74 KB
openssh-7.7p1-systemd-notify.patch 0000002595 2.53 KB
openssh-7.9p1-keygen-preserve-perms.patch 0000001304 1.27 KB
openssh-7.9p1-revert-new-qos-defaults.patch 0000002921 2.85 KB
openssh-8.0p1-gssapi-keyex.patch 0000125099 122 KB
openssh-8.1p1-audit.patch 0000074299 72.6 KB
openssh-8.1p1-ed25519-use-openssl-rng.patch 0000001715 1.67 KB
openssh-8.1p1-seccomp-clock_gettime64.patch 0000000844 844 Bytes
openssh-8.1p1-seccomp-clock_nanosleep.patch 0000000472 472 Bytes
openssh-8.1p1-seccomp-clock_nanosleep_time64.patch 0000000837 837 Bytes
openssh-8.1p1-use-openssl-kdf.patch 0000003878 3.79 KB
openssh-8.4p1-pam_motd.patch 0000000843 843 Bytes
openssh-8.4p1-ssh_config_d.patch 0000001485 1.45 KB
openssh-8.4p1-vendordir.patch 0000007137 6.97 KB
openssh-9.3p2.tar.gz 0001835850 1.75 MB
openssh-9.3p2.tar.gz.asc 0000000833 833 Bytes
openssh-askpass-gnome.changes 0000012233 11.9 KB
openssh-askpass-gnome.spec 0000002142 2.09 KB
openssh-do-not-send-empty-message.patch 0000000685 685 Bytes
openssh-fips-ensure-approved-moduli.patch 0000001788 1.75 KB
openssh-openssl-3.patch 0000003698 3.61 KB
openssh-reenable-dh-group14-sha1-default.patch 0000001524 1.49 KB
openssh-whitelist-syscalls.patch 0000000927 927 Bytes
openssh.changes 0000260359 254 KB
openssh.keyring 0000022720 22.2 KB
openssh.spec 0000020295 19.8 KB
ssh-askpass 0000000479 479 Bytes
ssh.reg 0000000500 500 Bytes
sshd-gen-keys-start 0000000225 225 Bytes
sshd-sle.pamd 0000000373 373 Bytes
sshd.fw 0000000135 135 Bytes
sshd.pamd 0000000538 538 Bytes
sshd.service 0000000394 394 Bytes
sysconfig.ssh 0000000221 221 Bytes
sysusers-sshd.conf 0000000064 64 Bytes
wtmpdb.patch 0000005130 5.01 KB
Revision 165 (latest revision is 177)
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1099856 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 165)
- Update to openssh 9.3p2
  * No changes for askpass, see main package changelog for
    details
- Update to openssh 9.3p2 (bsc#1213504, CVE-2023-38408):
  Security
  ========
  Fix CVE-2023-38408 - a condition where specific libaries loaded via
  ssh-agent(1)'s PKCS#11 support could be abused to achieve remote
  code execution via a forwarded agent socket if the following
  conditions are met:
  * Exploitation requires the presence of specific libraries on
    the victim system.
  * Remote exploitation requires that the agent was forwarded
    to an attacker-controlled system.
  Exploitation can also be prevented by starting ssh-agent(1) with an
  empty PKCS#11/FIDO allowlist (ssh-agent -P '') or by configuring
  an allowlist that contains only specific provider libraries.
  This vulnerability was discovered and demonstrated to be exploitable
  by the Qualys Security Advisory team. 
 
  In addition to removing the main precondition for exploitation,
  this release removes the ability for remote ssh-agent(1) clients
  to load PKCS#11 modules by default (see below).
  Potentially-incompatible changes
  --------------------------------
   * ssh-agent(8): the agent will now refuse requests to load PKCS#11
     modules issued by remote clients by default. A flag has been added
     to restore the previous behaviour "-Oallow-remote-pkcs11".
     Note that ssh-agent(8) depends on the SSH client to identify
     requests that are remote. The OpenSSH >=8.9 ssh(1) client does
     this, but forwarding access to an agent socket using other tools
     may circumvent this restriction. (forwarded request 1099810 from simotek)
Comments 4

Meinhard R's avatar

Is it possible to upgrade to a more recent version, please?


Sami Vento's avatar

openSSH-7.8 is available



André Werlang's avatar

Hello, is it possible to adhere to the new guidance regarding systemd ( https://en.opensuse.org/openSUSE:Systemd_packaging_guidelines#Requirements )? That is, dropping %{?systemd_requires} and using %{?systemd_ordering} instead. This is interesting for containers, git-core requires openssh which in turn requires systemd which requires many other things. Thanks in advance.

openSUSE Build Service is sponsored by