openssh

Описание:Port of OpenBSD's free SSH release
Домашняя страница:https://www.openssh.com/
Расположение:Portage
Легенда:
  • + - стабильный
  • ~ - нестабильный
  • M - замаскированный
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
9.5_p1 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
9.4_p1 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
9.3_p2 diff ~ + + + ~ ~ ~ + + ~ - + +
9.3_p1-r1 ~ + + + ~ ~ ~ + + ~ - + +

USE флаги

  • abi_mips_n32 - 64-bit (32-bit pointer) libraries
  • audit - Enable support for Linux audit subsystem using sys-process/audit
  • debug - Enable extra debug codepaths, like asserts and extra output. If you want to get meaningful backtraces see https://wiki.gentoo.org/wiki/Project:Quality_Assurance/Backtraces
  • kerberos - Add kerberos support
  • ldns - Use LDNS for DNSSEC/SSHFP validation.
  • libedit - Use the libedit library (replacement for readline)
  • livecd - Enable root password logins for live-cd environment.
  • pam - Add support for PAM (Pluggable Authentication Modules) - DANGEROUS to arbitrarily flip
  • pie - Build programs as Position Independent Executables (a security hardening technique)
  • sctp - Support for Stream Control Transmission Protocol
  • security-key - Include builtin U2F/FIDO support
  • selinux - !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
  • ssl - Enable additional crypto algorithms via OpenSSL
  • static - !!do not set this during bootstrap!! Causes binaries to be statically linked instead of dynamically
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • verify-sig - Verify upstream signatures on distfiles
  • X - Add support for X11
  • xmss - Enable XMSS post-quantum authentication algorithm

Советы по безопасности

Дата Опасность Заголовок
больше 1 года высокая OpenSSH: Remote Code Execution
почти 2 года высокая OpenSSH: Multiple Vulnerabilities
больше 3 лет средняя OpenSSH: Multiple vulnerabilities
около 5 лет средняя OpenSSH: Integer overflow
больше 5 лет средняя OpenSSH: Multiple vulnerabilities
около 6 лет низкая OpenSSH: User enumeration vulnerability
почти 7 года средняя OpenSSH: Permission issue
почти 8 года средняя OpenSSH: Multiple vulnerabilities
почти 9 года средняя OpenSSH: Multiple vulnerabilities
почти 9 года средняя OpenSSH: Multiple vulnerabilities
больше 10 лет высокая OpenSSH: Multiple vulnerabilities
больше 16 лет средняя OpenSSH: Privilege escalation
около 17 лет низкая OpenSSH: Security bypass
около 18 лет средняя OpenSSH: Multiple Denial of Service vulnerabilities
около 18 лет средняя OpenSSH: Denial of Service
почти 19 года низкая OpenSSH, Dropbear: Insecure use of system() call

Экспортировать в Atom

Спасибо!