ID | 3242 |
Package Name | openssh |
Version | 7.4p1 |
Release | 23.2.1.xcpng8.2 |
Epoch | |
Source | git+https://github.com/xcp-ng-rpms/openssh.git#2b4db73c0a92de065351b2b0f0fc41b801081082 |
Summary |
Description |
Built by | tescande |
State |
complete
|
Volume |
DEFAULT |
Started | Tue, 14 May 2024 14:21:53 CEST |
Completed | Tue, 14 May 2024 14:25:25 CEST |
Task | build (v8.2-incoming, /xcp-ng-rpms/openssh.git:2b4db73c0a92de065351b2b0f0fc41b801081082) |
Extra | {'source': {'original_url': 'git+https://github.com/xcp-ng-rpms/openssh.git?#2b4db73c0a92de065351b2b0f0fc41b801081082'}} |
Tags |
|
RPMs |
src | |
|
openssh-7.4p1-23.2.1.xcpng8.2.src.rpm (info) (download) |
x86_64 |
|
openssh-7.4p1-23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
openssh-cavs-7.4p1-23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
openssh-clients-7.4p1-23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
openssh-keycat-7.4p1-23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
openssh-ldap-7.4p1-23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
openssh-server-7.4p1-23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
openssh-server-sysvinit-7.4p1-23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
pam_ssh_agent_auth-0.10.3-2.23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
openssh-debuginfo-7.4p1-23.2.1.xcpng8.2.x86_64.rpm (info) (download)
|
|
Logs |
|
Changelog |
* Mon May 13 2024 Thierry Escande <thierry.escande@vates.tech> - 7.4p1-23.2.1 + 0.10.3-2.23.2.1
- Harden default ciphers and algorithms
- Disable GSSAPIAuthentication in sshd_config
- Remove build dependency on xauth (used for X11 forwarding not supported on XCP-ng hosts)
- Make use of xcpng_subrel macro for versioning
- Disable gnome_askpass
- Add BuildRequires for gcc
* Wed Jan 24 2024 Alex Brett <alex.brett@cloud.com> - 7.4p1-23.2 + 0.10.3-2
- Fix for CVE-2023-48795: Add strict key exchange extension
* Thu Dec 14 2023 Alex Brett <alex.brett@cloud.com> - 7.4p1-23.1 + 0.10.3-2
- Imported openssh-7.4p1-23.el7_9 from CentOS, including:
- Fix for CVE-2023-38408
- Fix for CVE-2021-41617
- Fix for CVE-2018-15473
- Fix for CVE-2017-15906
|