Release date:
2025-03-31 10:06:01 UTC
Description:
- CVE-2025-26465: fix vulnerability in OpenSSH when the VerifyHostKeyDNS option is enabled
- enlarge format buffer size for certificate serial number so the log message can record any 64-bit
integer without truncation (openssh bz#3012) [Orabug: 30448895]
Updated packages:
-
openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:00b018bb8b7e79232999896b79a93f5245082bb1012fcffd8a77fb2d883d8ee6
-
openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:c4fbb3648b3a1748a9db1089b0bdec876069ff3e7251e33f9b78b9a0bae35460
-
openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:ce0a75cadd9891dc1d2fac5fb2a0efb73294d962ecc2553580840e3cc3ab72ad
-
openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:3d0f53acf3c5dfbb5cd76582b0999ad2be79e2c6df65a8442805c72c49a1df79
-
openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:0df9ef4b7873412ab3a0e6859f45ebbe8f2354f66eabf1e562e9b788cd94f9f6
-
openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:2daf9599b09b8cfc4eb0fed98934aa62f8ea557dbd48e5eb39e7b9b9b341b61e
-
openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:f291f80d697c734f9661a04bf480cffe08ba3410c7023600ad550e80a4a48a87
-
openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:1bc6c5d5045e1189adf938eac603dd72f39c8c81a6d2e187c25b5b8e1c7cd91a
-
pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.i686.rpm
sha:aa0fc6fa1aff30df83d49c1cc991e67f6b21e51755859fd0e474408ebc8a20a4
-
pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:db799340b0a823a563b788e5f7b16779d81f60546a299d43c837cf0be326276d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.