openssh-askpass-8.7p1-43.el9> M Mv ĉJ4!!%joLne)Ip-Bm5 ']g)}releng@rockylinux.org p-Bm5 ']?iX?Zyf&evM;ǘVd'|@vYX3ݬ;0(֬?.-kRvZnVu9H2Jsݘ`ɆӫExWg%*Җ{!&=#a?#Qd  E48Hmq   $ @  PlT(8 !9!: /!GDH`I|XY\]^Abd!e! f!%l!(t!@u!\v!xw"\x"xy" """# #Copenssh-askpass8.7p143.el9A passphrase dialog for OpenSSH and XOpenSSH is a free version of SSH (Secure SHell), a program for logging into and executing commands on a remote machine. This package contains an X11 passphrase dialog for OpenSSH.g)pb-464b0cff-2081-4d53-8057-a8f5a47a65b8-b-x86-64^BRocky Linux 9.5Rocky Enterprise Software FoundationBSDRocky Linux Build System (Peridot) Unspecifiedhttp://www.openssh.com/portable.htmllinuxx86_64:F1]AAg)Eg)Eg)Fg)Fg)Fg)Fg)E8f138fd7caf5183aed0d2085c1f7d1746255d890ba26409084d4882c0b59880ad5ce176b494616eb798d5465a616e046eaa06ec513bf32314a2211a9b3b080bff079f2c2f608b3b293d973cc0078b2de51dab760d2e7671f92f5aa90091cc0ed../../../../usr/libexec/openssh/gnome-ssh-askpassgnome-ssh-askpassrootrootrootrootrootrootrootrootrootrootrootrootrootrootopenssh-8.7p1-43.el9.src.rpmopenssh-askpassopenssh-askpass(x86-64)@@@@@@@@@@    @libX11.so.6()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.34)(64bit)libc.so.6(GLIBC_2.4)(64bit)libgdk-x11-2.0.so.0()(64bit)libglib-2.0.so.0()(64bit)libgobject-2.0.so.0()(64bit)libgtk-x11-2.0.so.0()(64bit)opensshrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)rtld(GNU_HASH)8.7p1-43.el93.0.4-14.6.0-14.0-15.4.18-14.16.1.3f&@ff]@f3@f(@e@e@e@e6`@d!dZ@dm@dcp@dA)@d.@c@c@c @c]c-c,N@bbb@bVb@b@b@b@bγbb@bbDmitry Belyavskiy - 8.7p1-43Dmitry Belyavskiy - 8.7p1-42Dmitry Belyavskiy - 8.7p1-41Zoltan Fridrich - 8.7p1-40Dmitry Belyavskiy - 8.7p1-39Dmitry Belyavskiy - 8.7p1-38Dmitry Belyavskiy - 8.7p1-37Dmitry Belyavskiy - 8.7p1-36Dmitry Belyavskiy - 8.7p1-35Dmitry Belyavskiy - 8.7p1-34Dmitry Belyavskiy - 8.7p1-33Norbert Pocs - 8.7p1-32Norbert Pocs - 8.7p1-31Dmitry Belyavskiy - 8.7p1-30Dmitry Belyavskiy - 8.7p1-29Dmitry Belyavskiy - 8.7p1-28Zoltan Fridrich - 8.7p1-27Dmitry Belyavskiy - 8.7p1-26Dmitry Belyavskiy - 8.7p1-25Dmitry Belyavskiy - 8.7p1-24Dmitry Belyavskiy - 8.7p1-23Dmitry Belyavskiy - 8.7p1-22Dmitry Belyavskiy - 8.7p1-21Zoltan Fridrich - 8.7p1-20 + 0.10.4-5Dmitry Belyavskiy - 8.7p1-19 + 0.10.4-5Zoltan Fridrich - 8.7p1-18Dmitry Belyavskiy - 8.7p1-17Zoltan Fridrich - 8.7p1-16Dmitry Belyavskiy - 8.7p1-15Dmitry Belyavskiy - 8.7p1-14Zoltan Fridrich - 8.7p1-13Dmitry Belyavskiy - 8.7p1-12Zoltan Fridrich - 8.7p1-11- Possible remote code execution due to a race condition (CVE-2024-6409) Resolves: RHEL-45741- Possible remote code execution due to a race condition (CVE-2024-6387) Resolves: RHEL-45348- Fix ssh multiplexing connect timeout processing Resolves: RHEL-37748- Correctly audit hostname and IP address Resolves: RHEL-22316 - Make default key sizes configurable in sshd-keygen Resolves: RHEL-26454- Use FIPS-compatible API for key derivation Resolves: RHEL-32809- Fix Terrapin attack Resolves: CVE-2023-48795- Fix Terrapin attack Resolves: CVE-2023-48795- Fix Terrapin attack Resolves: CVE-2023-48795 - Relax OpenSSH build-time checks for OpenSSL version Related: RHEL-4734 - Forbid shell metasymbols in username/hostname Resolves: CVE-2023-51385- Relax OpenSSH checks for OpenSSL version Resolves: RHEL-4734 - Limit artificial delays in sshd while login using AD user Resolves: RHEL-2469 - Move users/groups creation logic to sysusers.d fragments Resolves: RHEL-5222- Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408- Allow specifying validity interval in UTC Resolves: rhbz#2115043- Fix pkcs11 issue with the recent changes - Delete unnecessary log messages from previous compl-dh patch - Add ssh_config man page explanation on rhbz#2068423 - Resolves: rhbz#2207793, rhbz#2209096- Fix minor issues with openssh-8.7p1-evp-fips-compl-dh.patch: - Check return values - Use EVP API to get the size of DH - Add some log debug lines - Related: rhbz#2091694- Some non-terminating processes were listening on ports. Resolves: rhbz#2177768 - On sshd startup, we check whether signing using the SHA1 for signing is available and don't use it when it isn't. - On ssh private key conversion we explicitly use SHA2 for testing RSA keys. - In sshd, when SHA1 signatures are unavailable, we fallback (fall forward :) ) to SHA2 on host keys proof confirmation. - On a client side we permit SHA2-based proofs from server when requested SHA1 proof (or didn't specify the hash algorithm that implies SHA1 on the client side). It is aligned with already present exception for RSA certificates. - We fallback to SHA2 if SHA1 signatures is not available on the client side (file sshconnect2.c). - We skip dss-related tests (they don't work without SHA1). Resolves: rhbz#2070163 - FIPS compliance efforts for dh, ecdh and signing Resolves: rhbz#2091694- Resolve possible self-DoS with some clients Resolves: rhbz#2186473- Do not try to use SHA1 for host key ownership proof when we don't support it server-side Resolves: rhbz#2088750- Add sk-dummy subpackage for test purposes Resolves: rhbz#2092780- Fix one-byte overflow in SSH banner processing Resolves: rhbz#2138345 - Fix double free() in error path Resolves: rhbz#2138347- Build fix after OpenSSL rebase Resolves: rhbz#2153626- Set minimal value of RSA key length via configuration option - support both names Resolves: rhbz#2128352- Set minimal value of RSA key length via configuration option Resolves: rhbz#2128352- Avoid spirous message on connecting to the machine with ssh-rsa keys Related: rhbz#2115246 - Set minimal value of RSA key length via configuration option Related: rhbz#2066882- IBMCA workaround Related: rhbz#1976202- Fix openssh-8.7p1-scp-clears-file.patch Related: rhbz#2056884- FIX pam_ssh_agent_auth auth for RSA keys Related: rhbz#2070113- Fix new coverity issues Related: rhbz#2068423- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Don't propose disallowed algorithms during hostkey negotiation Resolves: rhbz#2068423- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Add reference for policy customization in ssh/sshd_config manpages Resolves: rhbz#1984575- Disable sntrup761x25519-sha512 in FIPS mode Related: rhbz#2070628 - Disable ed25519 and ed25519-sk keys in FIPS mode Related: rhbz#2087915- Fix scp clearing file when src and dest are the same Resolves: rhbz#2056884 - Add missing options from ssh_config into ssh manpage Resolves: rhbz#2033372 - Fix several memory leaks Related: rhbz#2068423 - Fix gssapi authentication failures Resolves: rhbz#2091023 - Fix host-based authentication with rsa keys Resolves: rhbz#20889168.7p1-43.el98.7p1-43.el9gnome-ssh-askpass.cshgnome-ssh-askpass.sh.build-id5a002457944033262f642cddc289be00954ceb63gnome-ssh-askpassssh-askpass/etc/profile.d//usr/lib//usr/lib/.build-id//usr/lib/.build-id/5a//usr/libexec/openssh/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -march=x86-64-v2 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpiozstd19x86_64-redhat-linux-gnuASCII textdirectoryELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=5a002457944033262f642cddc289be00954ceb63, for GNU/Linux 3.2.0, stripped RRRRR RRRRRRutf-8fd813c1a697a3ebe1866c4ab39f8cb4058bb362343ad23f5e673d0d8354224fb23c96f36cf04748ae5876196eca585c301b2379aaee57ab0fc5382b41a1d7ef6?0(/hDKm7z|]Og e bL'u ԫ~*hsE֑1LvXBAj z{bdW(w1,cOtTFNd#]K  hJT?%IewUHj2kUCeeUEGU-@ׁ hS_)W,j >MgSSf ZbjHfW"L #5.X`gT' - W hA_ ܟc>StT&gsfukgpY^"~vm;Ch]zn?.Y>ïkw[ǿuwzK{WB qruw_ނų7uַx5ο w3~Wu+os\Wlosצ֞׹~_wҳn5 [sߴ}Żmڋeaw4vƽyuJ7޽]u^g/1~iǏ3G0,* 00`-9Y $r,`paA|bob|sZxE$DngdAOJHlU4G?fbxQRMHOS$DE|ؒF1EIјmFs{YY;cq銜9#eg~ P1Yǜ?zO?}}㸨啅IF&?E]klj:%ufXh)NIAE'V > $Y)۵WgS'y/ZMNoh6:I Z¨s5,L>?W:u4Wיj/~oκkkۄ&gӓ~zBEQ*}B3wU݈ƵOU jnl 08&eDHAYHݺ-U|Fµ* xkգd/jɫ*Xji&ڄㄹTPpـ l!p*K*&bZlzS(dQT$,wy VuCȿ W`[5,V f_ Nij*BQi{"*qHxWRsW TV`tS:&g>5kU1j .a4?[ҩ]C26U(p. 81BȽKlw{su isHwB`A &5Ҧ,XWzgq_G2ϯNg 1(~Ab[¹փOT!˼A/"^ѶB,v|\pB`[u"DO@]<5 » L K hH JňJǒJxh]a!Af>CkS8Dm)4݃ A7r-/̀E$9P~"9T% _m]5?T2* * 0dmM㓆v {($bb B46 U? |!2Ve9\S־Qn}_Ȇ߃AYyЬ17Ua[ #kؖ;m˼H mfsw +'<D/?n5k$X$v_`+rS s1.܊XnbUW{h ^JAVmQ98ダ$"POJ@ LkA/]prCdW #z3-$GPʍeo6ѭ}N{tF !FAA%Aр#KiG&)DdU֗ ~֣!F@⥏L7RDdU֗ ~?!؃Q(STPAH@q4N&%jJt 0ri"pgџȦ(&2VR1RCB @O/nM(QMY]phe.jk6QX5<ғ)( b{psIhqZ4pP bWp e/;[ >83$LeQR=@i 71B l1 Yg4j9)J9L2ԾeSf^~zvtrpj2)3-@?=;:98ouF?OώNN[fo,=\b9d5)~ 4QHVu#+Sr'YI:`E*7Sjuʢ cLj&URsd@xFeVT9 ć7;c__?ߛ~1qWJZaaY`[ hϯ‹ʅ5q]b[)}2j' og)8_lˠ8-`Α#. &'y=~wRǰ6).oddE~''(T$(p|Idl-}EFglP~9l>#lɗ3* \%IQRb!+I7 0 s}A~[ i A9szz;!rdS&vw+tgss̭Zw{Kw||wZ:[zgⲢy|ou+՝DcpK 7뒆ሾ,q5Sw FS*3# !4f?}aH-myHKWH\0x蠄>0|@z&KX"̕@w&nEQ`C35F@`]pKNN)Ujqe #?RRx BÉ1"`@w uI#Q $:!Č?&؃`Ct 3%M@$;%oKʈ#srdfdDD$Is!i4:0bB !ЉD$HAR07H\LRj7>lPĀı=5l  $tS zh+=qb0bkM7 -,E٩pNF:}>7$HMKbyo!8ZǸCUXj ?..2$wy "+Sy%c)@rR xN)i\4]%y>Rی=k4C_uOg,ӱp2l<Xi"E4 0o@/ 33!dgewQf὜ J RSNE#k 'i'FJJ#m< (N&zZVQ]tJJҷRVɕq˝zL9Ӳ(',YA._&8gH KyTA$8Jalj_yX` 8N~ [h6_KdEKc5 63I&7 k[ Ay?JeY䥂£Hͷ{Ɓ *)97pe`/Ȓ60sdϛ3B}[|XG 1)krgp]({Z)3]<`br/{fGˆ% 6 r.=LS\$uV $v'1u}OduIz9XE|r8̧r2KImǥ'e-dV_RXI8BMyCd+rP[A$^:\R{hεa4ϵuA4\0_.\[DDVo !Lߟv6 gТ g$|A<ߛ⚋L&|h['CE 1lwOB(B2T, ixjQq%D]rW"4KH9I+6U55fjXb zg#ߚOz\E6s"CO~e|Fr