[LWN Logo]
Subject: [RHBA-2000:076-03] Updated openssh packages available
From: bugzilla@redhat.com
Date: Mon, 9 Oct 2000 14:24 -0400
To: redhat-watch-list@redhat.com

                   Red Hat, Inc. Bug Fix Advisory

Synopsis:          Updated openssh packages available
Advisory ID:       RHBA-2000:076-03
Issue date:        2000-10-05
Updated on:        2000-10-09
Product:           Red Hat Linux
Keywords:          N/A
Cross references:  N/A

1. Topic:

Updated openssh packages are now available for Red Hat Linux 7.

2. Relevant releases/architectures:

Red Hat Linux 7.0 - i386
Red Hat Linux 7.0J - i386

3. Problem description:

The "UseLogin" option to the sshd server in the openssh-server package does
not work correctly because sshd was configured to run login from /usr/bin,
but the login binary is actually in /bin.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

17835 - update openssh to 2.2.0p1
17909 - Sshd doesn't place /usr/local/bin in the path.  UseLogin is broken.
18023 - '/etc/rc.d/init.d/sshd stop' doesn't stop all sshd processes, subsequent attempts to start ssh fail

6. RPMs required:

Red Hat Linux 7.0:



7. Verification:

MD5 sum                           Package Name
0242fb248dd828b124a7f086662e5312  7.0/SRPMS/openssh-2.2.0p1-5.src.rpm
e73a9ed1c329e8f33569eb1d97e19524  7.0/i386/openssh-2.2.0p1-5.i386.rpm
d4bb4b111850be291874f69cdcc45553  7.0/i386/openssh-askpass-2.2.0p1-5.i386.rpm
8e30f95b2f9d8eb1df7376dfc872b64b  7.0/i386/openssh-askpass-gnome-2.2.0p1-5.i386.rpm
de3ebfb8224f852cac3feecaa7d4d38c  7.0/i386/openssh-clients-2.2.0p1-5.i386.rpm
d52a1b9526f3d45ab5cf1e3a3e5aecf6  7.0/i386/openssh-server-2.2.0p1-5.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:


Copyright(c) 2000 Red Hat, Inc.

Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list