Пакет openssh-keycat-8.7p1-47.el9_7.inferit.x86_64
| Имя | openssh-keycat |
|---|---|
| Эпоха | 0 |
| Версия | 8.7p1 |
| Релиз | 47.el9_7.inferit |
| Архитектура | x86_64 |
| Сайт | http://www.openssh.com/portable.html |
| Лицензия | BSD |
| Время сборки | 2025-12-18 13:00:13 |
| Хост сборки | builder-x86-04.inferitos.ru |
| Краткое описание | A mls keycat backend for openssh |
| Репозитории | BaseOS |
| Полное описание | OpenSSH mls keycat is backend for using the authorized keys in the openssh in the mls mode. |
| Эррата | — |
| Размер | 19 КиБ |
| Исходный проект | openssh-8.7p1-47.el9_7.inferit |
| Контрольная сумма SHA-256 | 47564564077e99ddc596eafc9ffca561928118fc2b1841b6fadb50b623219150 |
×
* Thu Dec 18 2025 Arkady L. Shane <tigro@msvsphere-os.ru> - 8.7p1-47.inferit - Added BR: openssl-devel-engine - redirect message to docs.msvsphere-os.ru - Secure Fixes (INF-1950, INF-1951) * Tue Dec 09 2025 Zoltan Fridrich <zfridric@redhat.com> - 8.7p1-47 - CVE-2025-61984: Reject usernames with control characters Resolves: RHEL-128401 - CVE-2025-61985: Reject URL-strings with NULL characters Resolves: RHEL-128392 * Thu Nov 13 2025 Victor Evdokimov <viktor.evdokimov@softline.com> - 8.7p1-46.inferit.1 - Fixed memory leak in function sshd_selinux_change_privsep_preauth_context: memleak--preauth_context.patch * Mon Oct 27 2025 Victor Evdokimov <viktor.evdokimov@softline.com> - 8.7p1-46.inferit - Fixed null pointer using in function sshsk_sign: null-ptr-in-sshsk_sign.patch - Fixed null pointer using in function process_escapes: null-ptr-in-process_escapes.patch - Fixed extra malloc in function channel_request_remote_forwarding: extra-malloc-in-channel_request_remote_forwarding.patch - Fixed memory leak in function tilde_expand: memory-leak-in-tilde_expand.patch - Fixed too big memory allocation: calloc-size.patch - Corrected array size for function pdf_gen_xor: array-size--pdf_gen_xor.patch * Mon Jul 21 2025 Zoltan Fridrich <zfridric@redhat.com> - 8.7p1-46 - Move the redhat help message to debug1 log level Resolves: RHEL-104580 * Tue Feb 18 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-45 - Fix missing error codes set and invalid error code checks in OpenSSH. It prevents memory exhaustion attack and a MITM attack when VerifyHostKeyDNS is on (CVE-2025-26465). Resolves: RHEL-78700 * Mon Oct 21 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-44 - Add extra help information on ssh early failure Resolves: RHEL-33809 - Provide details on crypto error instead of "error in libcrypto" Resolves: RHEL-52293 - Allow duplicate Subsystem directive Resolves: RHEL-47112 * Tue Jul 09 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-43 - Possible remote code execution due to a race condition (CVE-2024-6409) Resolves: RHEL-45741 * Thu Jul 04 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-42 - Possible remote code execution due to a race condition (CVE-2024-6387) Resolves: RHEL-45348 * Mon Jun 03 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-41 - Fix ssh multiplexing connect timeout processing Resolves: RHEL-37748