Changelog for
pam_ssh-debuginfo-1.97-23.4.1.x86_64.rpm :
* Thu Jun 06 2013 vcizekAATTsuse.com- restore credentials before exitting from pam_sm_open_session
* fixes bnc#823484
* added James Carter\'s pam_ssh-1.97-no_tty_stay_as_user.patch
* Sat Jan 12 2013 cooloAATTsuse.com- remove suse_update_config
* Thu Jan 12 2012 vcizekAATTsuse.com- added patch that prevents segfault when empty passphrase is supplied (bnc#741541)
* Mon Nov 28 2011 jengelhAATTmedozas.de- Remove redundant/unwanted tags/section (cf. specfile guidelines)- Use %_smp_mflags for parallel building
* Sun Nov 27 2011 cooloAATTsuse.com- add libtool as buildrequire to avoid implicit dependency
* Sun Oct 30 2011 mkubecekAATTsuse.cz- pam_ssh-1.97-sigmask.patch: Clear signal mask before executing ssh-agent as pam_ssh code can be called from kdm with blocked TERM signal which would be inherited by ssh-agent (bnc#727246).
* Wed May 11 2011 vcizekAATTnovell.com- set gid/groups before executing ssh-agent (bnc#665061)
* Mon Apr 18 2011 vcizekAATTnovell.com- fix for bnc#688120 (pam_ssh double free)
* Mon Feb 01 2010 jengelhAATTmedozas.de- package baselibs.conf
* Wed Jun 24 2009 sbrabecAATTsuse.cz- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
* Wed Jun 24 2009 sbrabecAATTsuse.cz- Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
* Tue Apr 14 2009 anickaAATTsuse.cz- update to 1.97
* pam_get_pass.c: CVE-2009-1273 pam_ssh used a certain prompt if a user found to exist to ask for the SSH passphrase explicitely depending on whether the username was valid or invalid, which made it easier for remote attackers to enumerate usernames.- remove last patch
* Fri Apr 10 2009 anickaAATTsuse.cz- add fix for CVE-2009-1273 (bnc#492764) taken from Red Hat bugzilla (#492153)
* Thu Apr 10 2008 roAATTsuse.de- added baselibs.conf file to build xxbit packages for multilib support
* Mon Jan 14 2008 anickaAATTsuse.cz- update to 1.96
* pam_ssh.c (key_load_private_maybe): New wrapper for key_load_private() that checks whether the private key\'s passphrase is blank.
* pam_ssh.c: if PAM returns tty_raw = NULL we shouldn\'t fiddle with a per-session file. That seems to happen if the session module is used for background system services (like cron).
* pam_ssh.c: fixed double-free issue with file closing- remove last two patches (fixed in upstream)
* Mon Mar 05 2007 anickaAATTsuse.de- fix crash in pam_sm_open_session [#251053]
* Fri Nov 24 2006 maxAATTsuse.de- Fix crashes in in the session module (#223488).
* Tue Nov 07 2006 roAATTsuse.de- fix manpage permissions
* Thu Aug 03 2006 starkAATTsuse.de- update to version 1.94 (r23)
* improved logging
* more recover fixes
* root credentials weren\'t restored in some cases which caused following pam session modules to fail
* Sat Jun 24 2006 starkAATTsuse.de- update to version 1.93 (r18)
* debug option works for auth and session module (#177885)
* debug option is really available now for auth and session module (#177885)
* recover better if close_session wasn\'t executed (#187560)
* Wed Jun 07 2006 starkAATTsuse.de- logging fix is integrated now- auth handler now accepts nullok option
* Wed May 31 2006 starkAATTsuse.de- update to version 1.92
* allow working as session module without authentication (workaround for #173803)
* incorporated include fixes- fixed syslog logging (part of #177885)
* Wed Jan 25 2006 mlsAATTsuse.de- converted neededforbuild to BuildRequires
* Fri Oct 14 2005 roAATTsuse.de- added include openssl/md5.h to cipher.c
* Mon Oct 10 2005 schubiAATTsuse.de- added \"include
\"
* Tue Nov 09 2004 schubiAATTsuse.de- Bugfixes for other architectures
* Mon Nov 08 2004 schubiAATTsuse.de- first version