Changelog for
pam_ssh-debuginfo-1.97-22.1.i586.rpm :
Thu Jun 6 14:00:00 2013 vcizekAATTsuse.com
- restore credentials before exitting from pam_sm_open_session
* fixes bnc#823484
* added James Carter\'s pam_ssh-1.97-no_tty_stay_as_user.patch
Thu Jan 12 13:00:00 2012 vcizekAATTsuse.com
- added patch that prevents segfault when empty passphrase is
supplied (bnc#741541)
Mon Nov 28 13:00:00 2011 jengelhAATTmedozas.de
- Remove redundant/unwanted tags/section (cf. specfile guidelines)
- Use %_smp_mflags for parallel building
Sun Nov 27 13:00:00 2011 cooloAATTsuse.com
- add libtool as buildrequire to avoid implicit dependency
Sun Oct 30 13:00:00 2011 mkubecekAATTsuse.cz
- pam_ssh-1.97-sigmask.patch:
Clear signal mask before executing ssh-agent as pam_ssh code can
be called from kdm with blocked TERM signal which would be
inherited by ssh-agent (bnc#727246).
Wed May 11 14:00:00 2011 vcizekAATTnovell.com
- set gid/groups before executing ssh-agent (bnc#665061)
Mon Apr 18 14:00:00 2011 vcizekAATTnovell.com
- fix for bnc#688120 (pam_ssh double free)
Mon Feb 1 13:00:00 2010 jengelhAATTmedozas.de
- package baselibs.conf
Wed Jun 24 14:00:00 2009 sbrabecAATTsuse.cz
- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
Wed Jun 24 14:00:00 2009 sbrabecAATTsuse.cz
- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
Tue Apr 14 14:00:00 2009 anickaAATTsuse.cz
- update to 1.97
* pam_get_pass.c: CVE-2009-1273
pam_ssh used a certain prompt if a user found to exist to ask
for the SSH passphrase explicitely depending on whether the
username was valid or invalid, which made it easier for remote
attackers to enumerate usernames.
- remove last patch
Fri Apr 10 14:00:00 2009 anickaAATTsuse.cz
- add fix for CVE-2009-1273 (bnc#492764) taken from Red Hat
bugzilla (#492153)
Thu Apr 10 14:00:00 2008 roAATTsuse.de
- added baselibs.conf file to build xxbit packages
for multilib support
Mon Jan 14 13:00:00 2008 anickaAATTsuse.cz
- update to 1.96
* pam_ssh.c (key_load_private_maybe): New wrapper for
key_load_private() that checks whether the private key\'s
passphrase is blank.
* pam_ssh.c: if PAM returns tty_raw = NULL we shouldn\'t fiddle
with a per-session file. That seems to happen if the session
module is used for background system services (like cron).
* pam_ssh.c: fixed double-free issue with file closing
- remove last two patches (fixed in upstream)
Mon Mar 5 13:00:00 2007 anickaAATTsuse.de
- fix crash in pam_sm_open_session [#251053]
Fri Nov 24 13:00:00 2006 maxAATTsuse.de
- Fix crashes in in the session module (#223488).
Tue Nov 7 13:00:00 2006 roAATTsuse.de
- fix manpage permissions
Thu Aug 3 14:00:00 2006 starkAATTsuse.de
- update to version 1.94 (r23)
* improved logging
* more recover fixes
* root credentials weren\'t restored in some cases which caused
following pam session modules to fail
Sat Jun 24 14:00:00 2006 starkAATTsuse.de
- update to version 1.93 (r18)
* debug option works for auth and session module (#177885)
* debug option is really available now for auth and session
module (#177885)
* recover better if close_session wasn\'t executed (#187560)
Wed Jun 7 14:00:00 2006 starkAATTsuse.de
- logging fix is integrated now
- auth handler now accepts nullok option
Wed May 31 14:00:00 2006 starkAATTsuse.de
- update to version 1.92
* allow working as session module without authentication
(workaround for #173803)
* incorporated include fixes
- fixed syslog logging (part of #177885)
Wed Jan 25 13:00:00 2006 mlsAATTsuse.de
- converted neededforbuild to BuildRequires
Fri Oct 14 14:00:00 2005 roAATTsuse.de
- added include openssl/md5.h to cipher.c
Mon Oct 10 14:00:00 2005 schubiAATTsuse.de
- added \"include
\"
Tue Nov 9 13:00:00 2004 schubiAATTsuse.de
- Bugfixes for other architectures
Mon Nov 8 13:00:00 2004 schubiAATTsuse.de
- first version