Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

pam_ssh-1.97-20.1.2 RPM for x86_64

From OpenSuSE 12.2 for x86_64

Name: pam_ssh Distribution: openSUSE 12.2
Version: 1.97 Vendor: openSUSE
Release: 20.1.2 Build date: Mon Jul 16 18:31:38 2012
Group: Productivity/Networking/SSH Build host: build33
Size: 93989 Source RPM: pam_ssh-1.97-20.1.2.src.rpm
Packager: http://bugs.opensuse.org
Url: http://sourceforge.net/projects/pam-ssh/
Summary: PAM Module for SSH Authentication
This module provides single sign-on behavior. The user types a
passphrase when logging in and is allowed in if it decrypts the user s
SSH private key. An ssh-agent is started and keys are added. For the
entire session, the user types no more passwords.



Authors:
--------
    Andrew J. Korty <ajk@iu.edu>
    Roderick Schertler

Provides

Requires

License

BSD-3-Clause

Changelog

* Thu Jan 12 2012 vcizek@suse.com
  - added patch that prevents segfault when empty passphrase is
    supplied (bnc#741541)
* Mon Nov 28 2011 jengelh@medozas.de
  - Remove redundant/unwanted tags/section (cf. specfile guidelines)
  - Use %_smp_mflags for parallel building
* Sun Nov 27 2011 coolo@suse.com
  - add libtool as buildrequire to avoid implicit dependency
* Sun Oct 30 2011 mkubecek@suse.cz
  - pam_ssh-1.97-sigmask.patch:
    Clear signal mask before executing ssh-agent as pam_ssh code can
    be called from kdm with blocked TERM signal which would be
    inherited by ssh-agent (bnc#727246).
* Wed May 11 2011 vcizek@novell.com
  - set gid/groups before executing ssh-agent (bnc#665061)
* Mon Apr 18 2011 vcizek@novell.com
  - fix for bnc#688120 (pam_ssh double free)
* Mon Feb 01 2010 jengelh@medozas.de
  - package baselibs.conf
* Wed Jun 24 2009 sbrabec@suse.cz
  - Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
* Wed Jun 24 2009 sbrabec@suse.cz
  - Supplement pam-32bit/pam-64bit in baselibs.conf (bnc#354164).
* Tue Apr 14 2009 anicka@suse.cz
  - update to 1.97
    * pam_get_pass.c: CVE-2009-1273
    pam_ssh used a certain prompt if a user found to exist to ask
    for the SSH passphrase explicitely depending on whether the
    username was valid or invalid, which made it easier for remote
    attackers to enumerate usernames.
  - remove last patch
* Fri Apr 10 2009 anicka@suse.cz
  - add fix for CVE-2009-1273 (bnc#492764) taken from Red Hat
    bugzilla (#492153)

Files

/lib64/security/pam_ssh.so
/usr/share/doc/packages/pam_ssh
/usr/share/doc/packages/pam_ssh/NEWS
/usr/share/doc/packages/pam_ssh/README
/usr/share/doc/packages/pam_ssh/TODO
/usr/share/man/man8/pam_ssh.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Sep 15 22:28:40 2014