[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Package pam_ssh_agent_auth-0.10.4-5.47.el9_7.x86_64 download

Name pam_ssh_agent_auth
Epoch 0
Version 0.10.4
Release 5.47.el9_7
Architecture x86_64
Website/URL http://www.openssh.com/portable.html
License BSD
Build Time 2025-12-18 13:00:13
Build Host builder-x86-04.inferitos.ru
Summary PAM module for authentication with ssh-agent
Repositories AppStream
Description This package contains a PAM module which can be used to authenticate users using ssh keys stored in a ssh-agent. Through the use of the forwarding of ssh-agent connection it also allows to authenticate with remote ssh-agent instance. The module is most useful for su and sudo service stacks.
Errata
Size 66 KiB
Source Project openssh-8.7p1-47.el9_7.inferit
SHA-256 checksum 1cd5031c1517a9c7f3f8a784f606d378cda9a9bb5c4388e6e67ca964e6c09d7d
× Full screenshot
Changelog link
* Thu Dec 18 2025 Arkady L. Shane <tigro@msvsphere-os.ru> - 8.7p1-47.inferit
- Added BR: openssl-devel-engine
- redirect message to docs.msvsphere-os.ru
- Secure Fixes (INF-1950, INF-1951)

* Tue Dec 09 2025 Zoltan Fridrich <zfridric@redhat.com> - 8.7p1-47
- CVE-2025-61984: Reject usernames with control characters
  Resolves: RHEL-128401
- CVE-2025-61985: Reject URL-strings with NULL characters
  Resolves: RHEL-128392

* Thu Nov 13 2025 Victor Evdokimov <viktor.evdokimov@softline.com> - 8.7p1-46.inferit.1
- Fixed memory leak in function sshd_selinux_change_privsep_preauth_context:
  memleak--preauth_context.patch

* Mon Oct 27 2025 Victor Evdokimov <viktor.evdokimov@softline.com> - 8.7p1-46.inferit
- Fixed null pointer using in function sshsk_sign:
  null-ptr-in-sshsk_sign.patch
- Fixed null pointer using in function process_escapes:
  null-ptr-in-process_escapes.patch
- Fixed extra malloc in function channel_request_remote_forwarding:
  extra-malloc-in-channel_request_remote_forwarding.patch
- Fixed memory leak in function tilde_expand:
  memory-leak-in-tilde_expand.patch
- Fixed too big memory allocation:
  calloc-size.patch
- Corrected array size for function pdf_gen_xor:
  array-size--pdf_gen_xor.patch

* Mon Jul 21 2025 Zoltan Fridrich <zfridric@redhat.com> - 8.7p1-46
- Move the redhat help message to debug1 log level
  Resolves: RHEL-104580

* Tue Feb 18 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-45
- Fix missing error codes set and invalid error code checks in OpenSSH. It
  prevents memory exhaustion attack and a MITM attack when VerifyHostKeyDNS
  is on (CVE-2025-26465).
  Resolves: RHEL-78700

* Mon Oct 21 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-44
- Add extra help information on ssh early failure
  Resolves: RHEL-33809
- Provide details on crypto error instead of "error in libcrypto"
  Resolves: RHEL-52293
- Allow duplicate Subsystem directive
  Resolves: RHEL-47112

* Tue Jul 09 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-43
- Possible remote code execution due to a race condition (CVE-2024-6409)
  Resolves: RHEL-45741

* Thu Jul 04 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-42
- Possible remote code execution due to a race condition (CVE-2024-6387)
  Resolves: RHEL-45348

* Mon Jun 03 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-41
- Fix ssh multiplexing connect timeout processing
  Resolves: RHEL-37748