openssh-askpass-8.7p1-43.el9> M Mv ĉJ4!!%joLne)Ip-Bm5 ']g)zreleng@rockylinux.org p-Bm5 ']Ĕ4Wt@"5۶zzpZ,.Ÿ()<MV|^Gc{ .j򭓐뺽:UiҸt>'erS݌xx?Mn.qd;zdώB(:tTd# "丞|!İ 瀙TԬɜ {/rBdAɎ µk{3)y7"u`>"r ye a_)}\JC^b} Q/L2Bfg?NvhZiϫAL7)+>=h#~m]6\|o@U_3n;DX0?QNe53EbP)oNxZ]$hbn:5PbUAX=k~|j(S jLXznnGb_E^:dU42a0b66f2b7b77b723594b19fe22d0cebdf4024e1d10a13fc6ea9b48f18b4b8250aac26cf1e5b86df620ca3fc2c6900f45000390AAGVÓ\56cu>=# ?"d  E48Hmq   $ @  PlL(8!9`!: !GHI8X@YH\d]^bXd e f l t u!v! w"x",y"H "l"p"v""Copenssh-askpass8.7p143.el9A passphrase dialog for OpenSSH and XOpenSSH is a free version of SSH (Secure SHell), a program for logging into and executing commands on a remote machine. This package contains an X11 passphrase dialog for OpenSSH.g);pb-1029acd8-c9bc-4ea9-ab16-863240339d3d-b-ppc64le rRocky Linux 9.5Rocky Enterprise Software FoundationBSDRocky Linux Build System (Peridot) Unspecifiedhttp://www.openssh.com/portable.htmllinuxppc64le:F1 AAg)g)g)g)g)g)g)8f138fd7caf5183aed0d2085c1f7d1746255d890ba26409084d4882c0b59880ad5ce176b494616eb798d5465a616e046eaa06ec513bf32314a2211a9b3b080bf68753e49edf9b3d667f679efd5bf48ecad0cc61cb0333fbbe3e7f42518ba1e50../../../../usr/libexec/openssh/gnome-ssh-askpassgnome-ssh-askpassrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssh-8.7p1-43.el9.src.rpmopenssh-askpassopenssh-askpass(ppc-64)@@@@@@@@    @libX11.so.6()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.34)(64bit)libgdk-x11-2.0.so.0()(64bit)libglib-2.0.so.0()(64bit)libgobject-2.0.so.0()(64bit)libgtk-x11-2.0.so.0()(64bit)opensshrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)rtld(GNU_HASH)8.7p1-43.el93.0.4-14.6.0-14.0-15.4.18-14.16.1.3f&@ff]@f3@f(@e@e@e@e6`@d!dZ@dm@dcp@dA)@d.@c@c@c @c]c-c,N@bbb@bVb@b@b@b@bγbb@bbDmitry Belyavskiy - 8.7p1-43Dmitry Belyavskiy - 8.7p1-42Dmitry Belyavskiy - 8.7p1-41Zoltan Fridrich - 8.7p1-40Dmitry Belyavskiy - 8.7p1-39Dmitry Belyavskiy - 8.7p1-38Dmitry Belyavskiy - 8.7p1-37Dmitry Belyavskiy - 8.7p1-36Dmitry Belyavskiy - 8.7p1-35Dmitry Belyavskiy - 8.7p1-34Dmitry Belyavskiy - 8.7p1-33Norbert Pocs - 8.7p1-32Norbert Pocs - 8.7p1-31Dmitry Belyavskiy - 8.7p1-30Dmitry Belyavskiy - 8.7p1-29Dmitry Belyavskiy - 8.7p1-28Zoltan Fridrich - 8.7p1-27Dmitry Belyavskiy - 8.7p1-26Dmitry Belyavskiy - 8.7p1-25Dmitry Belyavskiy - 8.7p1-24Dmitry Belyavskiy - 8.7p1-23Dmitry Belyavskiy - 8.7p1-22Dmitry Belyavskiy - 8.7p1-21Zoltan Fridrich - 8.7p1-20 + 0.10.4-5Dmitry Belyavskiy - 8.7p1-19 + 0.10.4-5Zoltan Fridrich - 8.7p1-18Dmitry Belyavskiy - 8.7p1-17Zoltan Fridrich - 8.7p1-16Dmitry Belyavskiy - 8.7p1-15Dmitry Belyavskiy - 8.7p1-14Zoltan Fridrich - 8.7p1-13Dmitry Belyavskiy - 8.7p1-12Zoltan Fridrich - 8.7p1-11- Possible remote code execution due to a race condition (CVE-2024-6409) Resolves: RHEL-45741- Possible remote code execution due to a race condition (CVE-2024-6387) Resolves: RHEL-45348- Fix ssh multiplexing connect timeout processing Resolves: RHEL-37748- Correctly audit hostname and IP address Resolves: RHEL-22316 - Make default key sizes configurable in sshd-keygen Resolves: RHEL-26454- Use FIPS-compatible API for key derivation Resolves: RHEL-32809- Fix Terrapin attack Resolves: CVE-2023-48795- Fix Terrapin attack Resolves: CVE-2023-48795- Fix Terrapin attack Resolves: CVE-2023-48795 - Relax OpenSSH build-time checks for OpenSSL version Related: RHEL-4734 - Forbid shell metasymbols in username/hostname Resolves: CVE-2023-51385- Relax OpenSSH checks for OpenSSL version Resolves: RHEL-4734 - Limit artificial delays in sshd while login using AD user Resolves: RHEL-2469 - Move users/groups creation logic to sysusers.d fragments Resolves: RHEL-5222- Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408- Allow specifying validity interval in UTC Resolves: rhbz#2115043- Fix pkcs11 issue with the recent changes - Delete unnecessary log messages from previous compl-dh patch - Add ssh_config man page explanation on rhbz#2068423 - Resolves: rhbz#2207793, rhbz#2209096- Fix minor issues with openssh-8.7p1-evp-fips-compl-dh.patch: - Check return values - Use EVP API to get the size of DH - Add some log debug lines - Related: rhbz#2091694- Some non-terminating processes were listening on ports. Resolves: rhbz#2177768 - On sshd startup, we check whether signing using the SHA1 for signing is available and don't use it when it isn't. - On ssh private key conversion we explicitly use SHA2 for testing RSA keys. - In sshd, when SHA1 signatures are unavailable, we fallback (fall forward :) ) to SHA2 on host keys proof confirmation. - On a client side we permit SHA2-based proofs from server when requested SHA1 proof (or didn't specify the hash algorithm that implies SHA1 on the client side). It is aligned with already present exception for RSA certificates. - We fallback to SHA2 if SHA1 signatures is not available on the client side (file sshconnect2.c). - We skip dss-related tests (they don't work without SHA1). Resolves: rhbz#2070163 - FIPS compliance efforts for dh, ecdh and signing Resolves: rhbz#2091694- Resolve possible self-DoS with some clients Resolves: rhbz#2186473- Do not try to use SHA1 for host key ownership proof when we don't support it server-side Resolves: rhbz#2088750- Add sk-dummy subpackage for test purposes Resolves: rhbz#2092780- Fix one-byte overflow in SSH banner processing Resolves: rhbz#2138345 - Fix double free() in error path Resolves: rhbz#2138347- Build fix after OpenSSL rebase Resolves: rhbz#2153626- Set minimal value of RSA key length via configuration option - support both names Resolves: rhbz#2128352- Set minimal value of RSA key length via configuration option Resolves: rhbz#2128352- Avoid spirous message on connecting to the machine with ssh-rsa keys Related: rhbz#2115246 - Set minimal value of RSA key length via configuration option Related: rhbz#2066882- IBMCA workaround Related: rhbz#1976202- Fix openssh-8.7p1-scp-clears-file.patch Related: rhbz#2056884- FIX pam_ssh_agent_auth auth for RSA keys Related: rhbz#2070113- Fix new coverity issues Related: rhbz#2068423- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Don't propose disallowed algorithms during hostkey negotiation Resolves: rhbz#2068423- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Add reference for policy customization in ssh/sshd_config manpages Resolves: rhbz#1984575- Disable sntrup761x25519-sha512 in FIPS mode Related: rhbz#2070628 - Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Fix scp clearing file when src and dest are the same Resolves: rhbz#2056884 - Add missing options from ssh_config into ssh manpage Resolves: rhbz#2033372 - Fix several memory leaks Related: rhbz#2068423 - Fix gssapi authentication failures Resolves: rhbz#2091023 - Fix host-based authentication with rsa keys Resolves: rhbz#20889168.7p1-43.el98.7p1-43.el9gnome-ssh-askpass.cshgnome-ssh-askpass.sh.build-id3635e7ed4ade1059173f3294e15f4da5a361f5ddgnome-ssh-askpassssh-askpass/etc/profile.d//usr/lib//usr/lib/.build-id//usr/lib/.build-id/36//usr/libexec/openssh/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mcpu=power9 -mtune=power9 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19ppc64le-redhat-linux-gnuASCII textdirectoryELF 64-bit LSB pie executable, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=3635e7ed4ade1059173f3294e15f4da5a361f5dd, for GNU/Linux 3.10.0, stripped RRRRRRRRR utf-82608cb36a318298911cf951faca9c98bece8adf7d3318cc8ef2cd3a122cee5915e0572bc2b32fcb35de1bdad600d4235e0b2e2f7c3dcf7ad61004e909d5968d3?0(/h]zCOe%($5X,_a(>HDw<|փ 9||~c@b~͒Lkl!16['#ož'4/ Kd,] -l$ }Kuew3ҝ3!WʍMfRF*t #&C#DD@(  Izb;u8mxVԖ5"-m!: 3 YI8A" `!`rD}z#dD"V|U%" A\&H ;z/?ʩ5|RfaqjJ99`N"qĬgnsӖN)]eVNs>7i*n*551:GsZͩhJV\6Jt^*=V/:KovP.ŭšOY;i.OډYyӴծoZ8 d4UI2rm՚Z[훦qiv*:W3SC-{Ժz?V;{ڤV_ǭM\V&Rkju&SJ|Jj՚Uj8]tJbM:T\P%ԖεS)C.3~*gIiS̫s+T>-e`4ՖfuUtv*}gx?{y|e_;ŷ/-Ps7ywec~ܟ$X )~c!-@,@(@#_ ^X?eHt)xCȌ 8mE- OCҦ+JK@9s6I`|x禼w>oT{_}~^{HDSO&IJjz:IAQrTOPO)'(휋NzjO9ꥠ﬙6SNکUi%U|ҷԤuYK):&W|ȯxJ4Q9g(3S mriiwS3RO EE4%Td1[>[Y8*c~' iEHcF8 %&EArړKZq|'`$fVV=4X$% >V奟h5 |,3 Q]d}d%OD={1O(͜c$]11Kܴ$>h,~>6BMcqIM(FYZCu}%QT΂2,~Bl9qyV:, ]z!GA#)ɋ6lFgĮ _8=za̻Յ4m gmt|y6Ja,Bh`N'Iޝb67A;bn@kNed%MY%&!#ګ壟W,%(1Ì|Zkz6MWzXl nj,*.ywKzػ<^;s9CBRsݘs_>Qftجƻnvƍ7noDcB5jY5]8٤sSɝ+OSSgu;f1,M[ _%?@j-%y_2; 5Ա]iwYU-y`)ܠ%Џ"-;] e$:XFt1:el%@@Q ;m<%,Kelϊ5(LEiHt) i5o8%C$qBVv;jߪVay?d~K UviPh{#/ 6kt.W#OA E.$X,O"ہRY_=%6hvnʮ=uu{]i4Eܡ99{Rm\9-F-zrowZ l K"u0"QmO\E͸u1 ==)vĬbD4drdKS&T`I 9p궡_#)yr}$;j2Bd @ K"쉆-@Х2*.Ӟ5M`: j$v]>#Hw*އ&.< 1Isw# OpRCm, 4q //D+6M#}#Khhaɚh֎`BwH4H )h@BxB {*->L>2[IpH>B$ cB ~Mt<9@ΗHbw>镠c3g>)̲ȡ\Geuf)E1( 5B⯀@a9d} !c_(<`KE`u{}{˾szEN};#[^%=fO߾*"rWRrEr+X .I/-xi})^[J.-T:q|1vR8x%1Z߷]uu|4q1MfG*=6T6hӊs_sn43Σzu h[ojG:L\XG+:s:{9x~ @ ?[YʚnXH;mq&)${RRYI)BQqn&xK|pa6V†1aظ % K<,j01,)R5')ubKܓ-2LX f bkc*s>X{dJ4 8 <4a%,پ;Ȫ4@\AChG+Ph=(uO|M2lX 9DR d)vKl!aA2;R8p md`|8J+jTv|"̋9 >ĈbUni sV丁<Ioe#HK E(dc"ȱG$*G\r1Tƴ'7`-,p ru(ÉBɗcʌģ7$ȬE mpP ʏJ0^l4z ' YiYvcɓ)P JSc$-rt^_6􂯱|s(o.F p썆V2r6}LZ7+01F9BdE/I#$ ѽpܘLqׂs 0D@¹GyAjS]-|޶xf0ˏq6l5[Vv %ucq6ZmJlؠyt+UPi v"Ƥptl2K-zzkB/CCJ M uF2mQ84!*o/li Is˥vUCrQUil5&uϥtcRugρ& ?sN|' rdrĄ$3M+.W&) XӾTf<Ȅ;EJmn}s0/Dܲ]g@; >&Py-7ko2 {&hq+z2%2gCimlC볎&omͪct{Л+sǦvw'gzA?BNjTzfkc[} ƿ}ч#0{wC#v?ɿLXю 3˼OUwoQ[ɦ2h2]ak:ejP푐xZ6GiP|X>v G> 'MBo; ox O?r+<{5c GQ^!:xB,vuiPvry{/'a07j̿w=y~wmKy^5zhẁi s6qnhVŴ=ZZ2:ChU?{523NxtPN(νLyX=vv_ѺGw.KtB]}H|ؿFFje6x?x.ZmoѮ 5Oe\(x@_Bvflڶ:EI"dq |j%>z4S4²1'z1Vy9żGzSҬVdi'D8:w^{ؚ';hՈ+9Iu?حlH Xie`cŪm|~##W$i%Uڻ{B-U?S48E 0'oq?to`u82|fHX3H?b #fY#QΙ4Ҕ7X/[o5 W(Vt}A(cǂ7tJ2S<3i-3G9‚ ֯txeaO>ٍ$:\#a޿}H/}Ucү]A/}JÌߧ>ā/}q /y IqGy˘8R ~`s(B!@[%YM MFZH3DPjk R TtݢÞS)7WߐH =I=~.LLGUE3 `Z/BP^z%