Package openssh: Information
Source package: openssh
Version: 5.9p1-alt7.M60C.2
Build time: Oct 25, 2016, 04:52 PM in the task #171160
Category: Networking/Remote access
Report package bugHome page: http://www.openssh.com/portable.html
License: BSD-style
Summary: OpenSSH free Secure Shell (SSH) implementation
Description:
Ssh (Secure Shell) a program for logging into a remote machine and for executing commands in a remote machine. It is intended to replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it up to date in terms of security and features, as well as removing all patented algorithms to seperate libraries (OpenSSL).
List of rpms provided by this srpm:
openssh (x86_64, i586)
openssh-askpass-common (noarch)
openssh-clients (x86_64, i586)
openssh-clients-debuginfo (x86_64, i586)
openssh-common (x86_64, i586)
openssh-common-debuginfo (x86_64, i586)
openssh-keysign (x86_64, i586)
openssh-keysign-debuginfo (x86_64, i586)
openssh-server (x86_64, i586)
openssh-server-control (noarch)
openssh-server-debuginfo (x86_64, i586)
openssh (x86_64, i586)
openssh-askpass-common (noarch)
openssh-clients (x86_64, i586)
openssh-clients-debuginfo (x86_64, i586)
openssh-common (x86_64, i586)
openssh-common-debuginfo (x86_64, i586)
openssh-keysign (x86_64, i586)
openssh-keysign-debuginfo (x86_64, i586)
openssh-server (x86_64, i586)
openssh-server-control (noarch)
openssh-server-debuginfo (x86_64, i586)
Maintainer: Gleb Fotengauer-Malinovskiy
Last changed
Oct. 20, 2016 Gleb Fotengauer-Malinovskiy 5.9p1-alt7.M60C.2
- Backported upstream fixes for CVE-2015-8325, CVE-2016-3115, CVE-2016-6210, CVE-2016-8858.
Jan. 18, 2016 Gleb Fotengauer-Malinovskiy 5.9p1-alt7.M60C.1
- openssh-clients: disabled UseRoaming (fixes CVE-2016-0777 and CVE-2016-0778).
Nov. 8, 2013 Dmitry V. Levin 5.9p1-alt7
- sshd: applied upstream initialization fix (CVE-2013-4548).