openssh

Description:Port of OpenBSD's free SSH release
Homepage:https://www.openssh.com/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
9.5_p1 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
9.4_p1 diff ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ - ~ ~
9.3_p2 diff ~ + + + ~ ~ ~ + + ~ - + +
9.3_p1-r1 ~ + + + ~ ~ ~ + + ~ - + +

USE flags

  • abi_mips_n32 - 64-bit (32-bit pointer) libraries
  • audit - Enable support for Linux audit subsystem using sys-process/audit
  • debug - Enable extra debug codepaths, like asserts and extra output. If you want to get meaningful backtraces see https://wiki.gentoo.org/wiki/Project:Quality_Assurance/Backtraces
  • kerberos - Add kerberos support
  • ldns - Use LDNS for DNSSEC/SSHFP validation.
  • libedit - Use the libedit library (replacement for readline)
  • livecd - Enable root password logins for live-cd environment.
  • pam - Add support for PAM (Pluggable Authentication Modules) - DANGEROUS to arbitrarily flip
  • pie - Build programs as Position Independent Executables (a security hardening technique)
  • sctp - Support for Stream Control Transmission Protocol
  • security-key - Include builtin U2F/FIDO support
  • selinux - !!internal use only!! Security Enhanced Linux support, this must be set by the selinux profile or breakage will occur
  • ssl - Enable additional crypto algorithms via OpenSSL
  • static - !!do not set this during bootstrap!! Causes binaries to be statically linked instead of dynamically
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • verify-sig - Verify upstream signatures on distfiles
  • X - Add support for X11
  • xmss - Enable XMSS post-quantum authentication algorithm

Security Advisory

Date Severity Title
over 1 year high OpenSSH: Remote Code Execution
almost 2 years high OpenSSH: Multiple Vulnerabilities
over 3 years normal OpenSSH: Multiple vulnerabilities
about 5 years normal OpenSSH: Integer overflow
over 5 years normal OpenSSH: Multiple vulnerabilities
about 6 years low OpenSSH: User enumeration vulnerability
almost 7 years normal OpenSSH: Permission issue
almost 8 years normal OpenSSH: Multiple vulnerabilities
almost 9 years normal OpenSSH: Multiple vulnerabilities
almost 9 years normal OpenSSH: Multiple vulnerabilities
over 10 years high OpenSSH: Multiple vulnerabilities
over 16 years normal OpenSSH: Privilege escalation
about 17 years low OpenSSH: Security bypass
about 18 years normal OpenSSH: Multiple Denial of Service vulnerabilities
about 18 years normal OpenSSH: Denial of Service
almost 19 years low OpenSSH, Dropbear: Insecure use of system() call

Also available in: Atom

Thank you!