openssh-askpass-8.7p1-43.el9> M Mv ĉJ4!!%joLne)Ip-Bm5 ']g)yreleng@rockylinux.org p-Bm5 ']'CJ$ڭL(pKxvkGΚbdL^O ɷp0Qpa@Dz2SY@Uza1) 5h1AdeN rb":>eln-%QF5H ]o1ys.~ꢨl7w S 3y ǦJ{W?NnVqؽXz0vsӎqT5^7"ryhtPzq8eq mFȘծq??=+UeGu>۞wl hD5B9nL3أ~-APQqS6“qWߒLM It̷KlHdfb88ec7f1f79f128de3d47f21bb3f72e92e63ec46800f020750b099b16a3b7a2265360ecee3842585ecea74ea1af1b67d15fa83A>QIt 0h{Q>=#?#d  E04Dim     <  LhP(8!9!: !G H<IXX`Yh\]^bxd e f l t!u! v!<w"x"0y"L "t"x"~""Copenssh-askpass8.7p143.el9A passphrase dialog for OpenSSH and XOpenSSH is a free version of SSH (Secure SHell), a program for logging into and executing commands on a remote machine. This package contains an X11 passphrase dialog for OpenSSH.g)pb-72fa7d8d-086f-4927-93ed-7c95d404244c-b-s390xM*Rocky Linux 9.5Rocky Enterprise Software FoundationBSDRocky Linux Build System (Peridot) Unspecifiedhttp://www.openssh.com/portable.htmllinuxs390x:F1LhAAg)Sg)Sg)Yg)Yg)Yg)Wg)S8f138fd7caf5183aed0d2085c1f7d1746255d890ba26409084d4882c0b59880ad5ce176b494616eb798d5465a616e046eaa06ec513bf32314a2211a9b3b080bf1cea42f1cdc06309fd1d707b3a3745df95e950baf841a950cbffb4e6b4696b1d../../../../usr/libexec/openssh/gnome-ssh-askpassgnome-ssh-askpassrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssh-8.7p1-43.el9.src.rpmopenssh-askpassopenssh-askpass(s390-64)@@@@@@@@@    @libX11.so.6()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.2)(64bit)libc.so.6(GLIBC_2.34)(64bit)libc.so.6(GLIBC_2.4)(64bit)libgdk-x11-2.0.so.0()(64bit)libglib-2.0.so.0()(64bit)libgobject-2.0.so.0()(64bit)libgtk-x11-2.0.so.0()(64bit)opensshrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)rtld(GNU_HASH)8.7p1-43.el93.0.4-14.6.0-14.0-15.4.18-14.16.1.3f&@ff]@f3@f(@e@e@e@e6`@d!dZ@dm@dcp@dA)@d.@c@c@c @c]c-c,N@bbb@bVb@b@b@b@bγbb@bbDmitry Belyavskiy - 8.7p1-43Dmitry Belyavskiy - 8.7p1-42Dmitry Belyavskiy - 8.7p1-41Zoltan Fridrich - 8.7p1-40Dmitry Belyavskiy - 8.7p1-39Dmitry Belyavskiy - 8.7p1-38Dmitry Belyavskiy - 8.7p1-37Dmitry Belyavskiy - 8.7p1-36Dmitry Belyavskiy - 8.7p1-35Dmitry Belyavskiy - 8.7p1-34Dmitry Belyavskiy - 8.7p1-33Norbert Pocs - 8.7p1-32Norbert Pocs - 8.7p1-31Dmitry Belyavskiy - 8.7p1-30Dmitry Belyavskiy - 8.7p1-29Dmitry Belyavskiy - 8.7p1-28Zoltan Fridrich - 8.7p1-27Dmitry Belyavskiy - 8.7p1-26Dmitry Belyavskiy - 8.7p1-25Dmitry Belyavskiy - 8.7p1-24Dmitry Belyavskiy - 8.7p1-23Dmitry Belyavskiy - 8.7p1-22Dmitry Belyavskiy - 8.7p1-21Zoltan Fridrich - 8.7p1-20 + 0.10.4-5Dmitry Belyavskiy - 8.7p1-19 + 0.10.4-5Zoltan Fridrich - 8.7p1-18Dmitry Belyavskiy - 8.7p1-17Zoltan Fridrich - 8.7p1-16Dmitry Belyavskiy - 8.7p1-15Dmitry Belyavskiy - 8.7p1-14Zoltan Fridrich - 8.7p1-13Dmitry Belyavskiy - 8.7p1-12Zoltan Fridrich - 8.7p1-11- Possible remote code execution due to a race condition (CVE-2024-6409) Resolves: RHEL-45741- Possible remote code execution due to a race condition (CVE-2024-6387) Resolves: RHEL-45348- Fix ssh multiplexing connect timeout processing Resolves: RHEL-37748- Correctly audit hostname and IP address Resolves: RHEL-22316 - Make default key sizes configurable in sshd-keygen Resolves: RHEL-26454- Use FIPS-compatible API for key derivation Resolves: RHEL-32809- Fix Terrapin attack Resolves: CVE-2023-48795- Fix Terrapin attack Resolves: CVE-2023-48795- Fix Terrapin attack Resolves: CVE-2023-48795 - Relax OpenSSH build-time checks for OpenSSL version Related: RHEL-4734 - Forbid shell metasymbols in username/hostname Resolves: CVE-2023-51385- Relax OpenSSH checks for OpenSSL version Resolves: RHEL-4734 - Limit artificial delays in sshd while login using AD user Resolves: RHEL-2469 - Move users/groups creation logic to sysusers.d fragments Resolves: RHEL-5222- Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408- Allow specifying validity interval in UTC Resolves: rhbz#2115043- Fix pkcs11 issue with the recent changes - Delete unnecessary log messages from previous compl-dh patch - Add ssh_config man page explanation on rhbz#2068423 - Resolves: rhbz#2207793, rhbz#2209096- Fix minor issues with openssh-8.7p1-evp-fips-compl-dh.patch: - Check return values - Use EVP API to get the size of DH - Add some log debug lines - Related: rhbz#2091694- Some non-terminating processes were listening on ports. Resolves: rhbz#2177768 - On sshd startup, we check whether signing using the SHA1 for signing is available and don't use it when it isn't. - On ssh private key conversion we explicitly use SHA2 for testing RSA keys. - In sshd, when SHA1 signatures are unavailable, we fallback (fall forward :) ) to SHA2 on host keys proof confirmation. - On a client side we permit SHA2-based proofs from server when requested SHA1 proof (or didn't specify the hash algorithm that implies SHA1 on the client side). It is aligned with already present exception for RSA certificates. - We fallback to SHA2 if SHA1 signatures is not available on the client side (file sshconnect2.c). - We skip dss-related tests (they don't work without SHA1). Resolves: rhbz#2070163 - FIPS compliance efforts for dh, ecdh and signing Resolves: rhbz#2091694- Resolve possible self-DoS with some clients Resolves: rhbz#2186473- Do not try to use SHA1 for host key ownership proof when we don't support it server-side Resolves: rhbz#2088750- Add sk-dummy subpackage for test purposes Resolves: rhbz#2092780- Fix one-byte overflow in SSH banner processing Resolves: rhbz#2138345 - Fix double free() in error path Resolves: rhbz#2138347- Build fix after OpenSSL rebase Resolves: rhbz#2153626- Set minimal value of RSA key length via configuration option - support both names Resolves: rhbz#2128352- Set minimal value of RSA key length via configuration option Resolves: rhbz#2128352- Avoid spirous message on connecting to the machine with ssh-rsa keys Related: rhbz#2115246 - Set minimal value of RSA key length via configuration option Related: rhbz#2066882- IBMCA workaround Related: rhbz#1976202- Fix openssh-8.7p1-scp-clears-file.patch Related: rhbz#2056884- FIX pam_ssh_agent_auth auth for RSA keys Related: rhbz#2070113- Fix new coverity issues Related: rhbz#2068423- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Don't propose disallowed algorithms during hostkey negotiation Resolves: rhbz#2068423- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Add reference for policy customization in ssh/sshd_config manpages Resolves: rhbz#1984575- Disable sntrup761x25519-sha512 in FIPS mode Related: rhbz#2070628 - Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Fix scp clearing file when src and dest are the same Resolves: rhbz#2056884 - Add missing options from ssh_config into ssh manpage Resolves: rhbz#2033372 - Fix several memory leaks Related: rhbz#2068423 - Fix gssapi authentication failures Resolves: rhbz#2091023 - Fix host-based authentication with rsa keys Resolves: rhbz#20889168.7p1-43.el98.7p1-43.el9gnome-ssh-askpass.cshgnome-ssh-askpass.sh.build-idda753b41efd3a12e7ff6a7bbc3a5a2835dad14c7gnome-ssh-askpassssh-askpass/etc/profile.d//usr/lib//usr/lib/.build-id//usr/lib/.build-id/da//usr/libexec/openssh/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=z14 -mtune=z15 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19s390x-redhat-linux-gnuASCII textdirectoryELF 64-bit MSB pie executable, IBM S/390, version 1 (SYSV), dynamically linked, interpreter /lib/ld64.so.1, BuildID[sha1]=da753b41efd3a12e7ff6a7bbc3a5a2835dad14c7, for GNU/Linux 3.2.0, stripped RRRRRRRRRR utf-8fa69c82a691d54d87bbec51b61639b87840d005e70ef82e2b8e009b18ae5f5ebc87da7632306f9bf81fcef85a7883b2773dc4db63bdb638c42cf4b53be18c44c?0(/hE $DQFi+9{$Š q@Dx-L:o047&gq,)-+1*"k քk^i@=N{ ;D !]E1)'?ь[m}> qwbfxy;W5ᤄU ۈl6jRd5j | sjbR"qV**@0Lz.{GzFy6iN2!%zA5*4 j]Q=G$ N13fٓy:]erA.G.[ծi@mAKflr0frj221KPai'F&%%MկOFkM8FNYԆdJלybkg})snSmeU*wNP+;jum2gx e^g4PDb>>uꕎм wj]˸q[sZSu;4Y}3͢Wg뵍/`oZ9Zk2pM[Kqk5߶^qeL̯=oI[V< ͤ}[i3&զ̨ͼW=j^[~f2ɬL28Lk6(>o&{:m*[i=g8HfܖL }?%f^\q>p!_*xqd+}@S!`pla2 %s,?$[1 wyM!a$I vq<w D*@A i0ZWfWl#xntR^D"0:T6W2qDo'1 囡'jI/J$SZ2?鄄Ч$D7=(*t4lzZM(~zP[ JN(NMbsU|YckM]ץkٕd^}}ewO1验VRM%QZ]ztMONRRLQPH'<"3"5= ,Ioù'HXfh/uPb "rA^WFe~]ȥ_mnl.6ko}',4wcHZ 7j 2~_<./b>1H FT mho㡼;?|&[4eaքLj5|#y~w'&[2_l,G0?,e(F σwM8S[45h?+1Ul0Al[Az⃚%DR6IX E%ȕk>[^WİҪG<Bn~[2@M(#`x^__YbmzO~'ILv0z}߼P7aB~:eҿ6~m{6uQsTE%0W ^i>KF?sSc ].oF}ۏ] ?_QooC=mԚz_o^-9 b==Zޑ'v||bB-L_.i2HԆO9D\ܵ ;&ޕ> _"? q ѝ '푒IZHW4bomN#rSmS s7E8B^2?٫y/c\%Xa' ܜbB":"ȑbY4Pe8: R8愉D5.ÚCzTUfSyH//@[YږbS<b10QbʸA/:k{jʍR䤄FJ٢O**/t@Ʀ/t@Ʀ> B$mlB$ml~66UHTQ:!ljd qvlϔb')>A9r7JƏ0p4*#_@F`P(x"@{οsOC3 Ha ;CBV0':V\AqAa#0́3AN<}^~jϜ3~εs֧Rl)XQVo{<=Cj:=RB<եwM^벚Ye~e??o~2?XW uN[<]Wf?~Wu~> kI:95ԊS猭4GF3Ԧe7IH'X&_X,Pμ =HSw&w?Ӵ?:%OzwW{2 7;29 anG%*W3w;OD ~}w_%> ˼h@ݼ@[hRACXNn6lG~pQbqCtX{ve{ͼΪAFDYgL #1=|`[WjL?3]u[ҵ#C}/} 0^Ao_4hZz9)j' x$<DHf #p֜Q[EQ!BDXVZ̩qhj)4FYxsa9Q!yV2D.郼{XB)^rra'h̃$iJ]/4 1 qp 1 в HbSה]"WlWŒ_C71X-(GW""r.0S 80H,jJP jf\`!jZg% H}7|Q\afO*~RU! w3\EuR cQ6JL]iVY0#A(9pe5r()Z$PR1+GbWh(b'Ah#Iv ! PU(4bS"xyf?d;Jť&vBGm  #'W&1Z)FsBObaJX:,xH<Վ qUɉȑ1.LT$jZ+ ohwKS :՗l=͏@{rO?qO`Nn \9 m \񚶨sPg(x Xp#Sn)(R՚U!olna$bjaё%&F6v zgWDDMZ]$rbMʼXfeCD+c;9JK GF8•lȑW֜ 5YhS],:=0r  |ڀr~̬GWذ$8a,rc x/*ހi(qϛ cDXtxX)W A!3^z킯Orc&"CMx >AUdؔr[fSO2l?@ae h^();^-2F݉誹7^u7\VhQ9ϮXkL{.-]Fe[gWs‚ [" 'JY;,5/b(2.k0]z w  ш9JIyE?x;ȸD6^x`-LǷxZwt:>CrYHSho4S|>72SWƩޡb|f0Yn3fCfSȝ?g##!CR * bcW \>@vd49Pڌ!SՈ(6?:))9C.efփvf_9Я1>FSG\н3L"J5<&L"pA%_]|ޑZ;nNxty(x7İ_m5"awfk+]T1=U/[~OJyJZʶ˫I"ҡy2_4ۨw 'ӝr'd"F J;rTF)WU#bxX35lZk]Vс?J|^i=6dm6 z^u R-mo%W|7gFp;$F~0MdZd aIeР;6ʑMV YjJxptOĵg,s{m 6$Iil*3^U&l:s/-!m9v?ڪ6^>Lf&,,WՎņbWbO4TJr) 3N:C)\-0 ɻIi}\Nڌь'_og{z/g~w3xnIŋH+9(4r|St[:kULPU{c7mܴL(Bez҃98^:22Sk9ڕx'w8gFy%X>k5S@3 Y.L^'o`U'l{=xP-@:LpN2x.xibW}̩`>kvTRH7K #h$i7Nw:"#:m|VElriYn2 </WF=,d 2nYet ] v 7SWtsٱT`eu&X D ^> rh@-CuFuoWm7I$/pE2\ Wan2G+pe"W+սrmbJ"|tG\WQn#Y,dbF!Q(f04J-R =]ŋbn?O.c>Q}eų{1ʞ_ƃ>Mv}>j~mɿ{rOxJl/D2 ܛ~|SpQkXCs ٓ"֧yt !/ѦEw:x$$?>Y31떝 Vw}7Gv;OH,i 0l׷@%;q#cShA;v㥕';ʳOF'eV.QO(Y$qd\ yR,ũ[xgUNY"{;_X0i&hm4ۡ)h|r>a-i˘WQ4`vod' Fhg1Os,5H@̫TcA.?Hں'tt_" @.|ҏ.i9hZXV.Zj