<feed xmlns='http://www.w3.org/2005/Atom'>
<title>packages/net/openssh, branch master</title>
<subtitle>Mirror of packages feed</subtitle>
<id>https://git-03.infra.openwrt.org/feed/packages/atom?h=master</id>
<link rel='self' href='https://git-03.infra.openwrt.org/feed/packages/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/'/>
<updated>2026-04-06T19:22:32Z</updated>
<entry>
<title>openssh: update to 10.3p1</title>
<updated>2026-04-06T19:22:32Z</updated>
<author>
<name>John Audia</name>
</author>
<published>2026-04-05T15:29:28Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=48354f0b9f308801013d2ca609eb67de6703e4f1'/>
<id>urn:sha1:48354f0b9f308801013d2ca609eb67de6703e4f1</id>
<content type='text'>
Changelog: https://www.openssh.com/txt/release-10.3

Build system: x86/64
Build-tested: x86/64-glibc
Run-tested: x86/64-glibc

Signed-off-by: John Audia &lt;therealgraysky@proton.me&gt;
</content>
</entry>
<entry>
<title>openssh: update to 10.2p1</title>
<updated>2025-10-17T03:50:11Z</updated>
<author>
<name>John Audia</name>
</author>
<published>2025-10-15T12:29:11Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=4845aca6a3f8b6e2908874f1be3d99839f515dd6'/>
<id>urn:sha1:4845aca6a3f8b6e2908874f1be3d99839f515dd6</id>
<content type='text'>
Changelog: https://www.openssh.com/txt/release-10.2

Build system: x86/64
Build-tested: x86/64-glibc
Run-tested: x86/64-glibc

Signed-off-by: John Audia &lt;therealgraysky@proton.me&gt;
</content>
</entry>
<entry>
<title>openssh: update to 10.1p1</title>
<updated>2025-10-11T16:01:17Z</updated>
<author>
<name>John Audia</name>
</author>
<published>2025-10-06T18:35:46Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=a503ffe6b837924d8c93a9be450c1b3dcaf08960'/>
<id>urn:sha1:a503ffe6b837924d8c93a9be450c1b3dcaf08960</id>
<content type='text'>
Changelog: https://www.openssh.com/txt/release-10.1

Build system: x86/64
Build-tested: x86/64-glibc
Run-tested: x86/64-glibc

Signed-off-by: John Audia &lt;therealgraysky@proton.me&gt;
</content>
</entry>
<entry>
<title>openssh: adjust with glibc and libcrypt-compat</title>
<updated>2025-07-14T08:40:15Z</updated>
<author>
<name>Konstantin Demin</name>
</author>
<published>2025-07-09T16:26:59Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=6ff10c3abfb799d7a451711d1e20bcb2fe8c7f95'/>
<id>urn:sha1:6ff10c3abfb799d7a451711d1e20bcb2fe8c7f95</id>
<content type='text'>
glibc 2.39 has removed libcrypt completely.
solution: link against libxcrypt built with glibc compatibility.

Signed-off-by: Konstantin Demin &lt;rockdrilla@gmail.com&gt;
</content>
</entry>
<entry>
<title>openssh: wrong permissions on /etc/ssh</title>
<updated>2025-06-07T20:44:07Z</updated>
<author>
<name>Philip Prindeville</name>
</author>
<published>2025-06-07T18:16:34Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=023b7bf21f4c8e7d2b7c7e7042298c819e8a7590'/>
<id>urn:sha1:023b7bf21f4c8e7d2b7c7e7042298c819e8a7590</id>
<content type='text'>
For users to make use of system-wide settings, the /etc/ssh/
directory and its contents need to be world readable.

Fixes: #26608
Signed-off-by: Philip Prindeville &lt;philipp@redfish-solutions.com&gt;
</content>
</entry>
<entry>
<title>net/openssh: fix PKG_CPE_ID</title>
<updated>2025-04-24T11:44:38Z</updated>
<author>
<name>Fabrice Fontaine</name>
</author>
<published>2025-02-26T21:16:59Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=4faf09cfb594b7564e87e15e2e294949f2f177f7'/>
<id>urn:sha1:4faf09cfb594b7564e87e15e2e294949f2f177f7</id>
<content type='text'>
openbsd:openssh is a better CPE ID than openssh:openssh as this CPE ID
has the latest CVEs (whereas openssh:openssh has no CVEs):
https://nvd.nist.gov/products/cpe/search/results?keyword=cpe:2.3:a:openbsd:openssh

Fixes: 299e5b0a9bce19d6e96cb9ff217028b36ee2dd36 (treewide: add PKG_CPE_ID for better cvescanner coverage)

Signed-off-by: Fabrice Fontaine &lt;fontaine.fabrice@gmail.com&gt;
</content>
</entry>
<entry>
<title>openssh: bump to 10.0p1</title>
<updated>2025-04-16T16:52:44Z</updated>
<author>
<name>John Audia</name>
</author>
<published>2025-04-12T19:38:46Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=0ec5c1e1a999135b2dd9924da209094d96d1c0f9'/>
<id>urn:sha1:0ec5c1e1a999135b2dd9924da209094d96d1c0f9</id>
<content type='text'>
This update requires sshd-auth to be packaged due to the authentication
bin split introduced in this version.

Changelog: https://www.openssh.com/txt/release-10.0

Build system: x86/64
Build-tested: x86/64
Run-tested: x86/64

Signed-off-by: John Audia &lt;therealgraysky@proton.me&gt;
</content>
</entry>
<entry>
<title>openssh: add FIDO U2F and FIDO2 hardware token support</title>
<updated>2025-04-13T08:48:17Z</updated>
<author>
<name>Mikael Magnusson</name>
</author>
<published>2025-03-26T17:57:52Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=2bd00ef7899654dd43f9c8c1decd1378cae16352'/>
<id>urn:sha1:2bd00ef7899654dd43f9c8c1decd1378cae16352</id>
<content type='text'>
Add openssh-sk-helper package containing ssh-sk-helper.

The helper can be used by openssh-client, openssh-sftp-client,
and openssh-keygen to access `ecdsa_sk` and `ed25519_sk keys
provided by a FIDO U2F or FIDO2 hardware token connected over USB.

Close #24509

Signed-off-by: Mikael Magnusson &lt;mikma@users.sourceforge.net&gt;
</content>
</entry>
<entry>
<title>Revert "openssh: Add FIDO2 hardware token support"</title>
<updated>2025-04-13T08:48:17Z</updated>
<author>
<name>Mikael Magnusson</name>
</author>
<published>2025-03-26T23:15:26Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=0a3ef8cbf4fc1fe9099e68ac8fa10f57b2545019'/>
<id>urn:sha1:0a3ef8cbf4fc1fe9099e68ac8fa10f57b2545019</id>
<content type='text'>
This reverts commit 855db864b0c4d2dcc5ed2f0182ea4a7942314086.

The reverted commit doesn't make sense since the component
(ssh-sk-helper) that uses libfido2, which is mentioned in
the commit message, isn't packaged.

Signed-off-by: Mikael Magnusson &lt;mikma@users.sourceforge.net&gt;
</content>
</entry>
<entry>
<title>openssh: bump to 9.9p2</title>
<updated>2025-02-20T08:48:21Z</updated>
<author>
<name>John Audia</name>
</author>
<published>2025-02-18T17:57:33Z</published>
<link rel='alternate' type='text/html' href='https://git-03.infra.openwrt.org/feed/packages/commit/?id=67784bf4d09b507f7a8ad68cd0910bf654a3bec0'/>
<id>urn:sha1:67784bf4d09b507f7a8ad68cd0910bf654a3bec0</id>
<content type='text'>
Updated and removed upstreamed patch.

Highlights relating to security:

* Fix CVE-2025-26465 - ssh(1) in OpenSSH versions 6.8p1 to 9.9p1
  (inclusive) contained a logic error that allowed an on-path
  attacker (a.k.a MITM) to impersonate any server when the
  VerifyHostKeyDNS option is enabled. This option is off by default.

* Fix CVE-2025-26466 - sshd(8) in OpenSSH versions 9.5p1 to 9.9p1
  (inclusive) is vulnerable to a memory/CPU denial-of-service related
  to the handling of SSH2_MSG_PING packets. This condition may be
  mitigated using the existing PerSourcePenalties feature.

Both vulnerabilities were discovered and demonstrated to be exploitable
by the Qualys Security Advisory team. We thank them for their detailed
review of OpenSSH.

Full release notes: https://www.openssh.com/txt/release-9.9p2

Signed-off-by: John Audia &lt;therealgraysky@proton.me&gt;
</content>
</entry>
</feed>
