Release date:
2025-03-25 18:11:22 UTC
Description:
- CVE-2025-26465: fix vulnerability in OpenSSH when the VerifyHostKeyDNS option is enabled
- enlarge format buffer size for certificate serial number so the log message can record any 64-bit
integer without truncation (openssh bz#3012) [Orabug: 30448895]
Updated packages:
-
openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:35f70cd9f34f270ebf42d65765b2e31e0d9dfba48da68d93eece8c9778806260
-
openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:a01770dc68367c22714a8a35b153fe162857fc08d256780a1ac85ce2cfbd3e1e
-
openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:ddc28a0724579b812fd1530f6aff1ced95f1a8fda797c6ff21e6c3aab946b46a
-
openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:9712fe8a255f2d982d15234a96735f7328fc71d5cc4e1d214460431d1b44bb31
-
openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:6bcefbf2c687d8a8d3d324e10b6a5af8880118f5cdc6e78a89f83827e2a243ec
-
openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:ab4b72e218a0c19154ba0b769e91cb746e8ac789e6a550d5a66fe8cbe73e5cda
-
openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:b43183b99f1c4a21a1bfb0bd2305397659d25e9b41a16d27579a40d010e7c2d4
-
openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:94550772325cbbc0bacfeb2b1228b4c29c8ebd8d7fc96ed23c51e0ebeb5e15a7
-
pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.i686.rpm
sha:f8b7b15f0e10fa6935ac91127a2e7951dad00e32cddca0987e178eafa86b1405
-
pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:21af54382dcb1c29ba96d7303391ef423528b0e50550c60c2dc707be98d3d67e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.