Release date:
2025-03-23 12:12:16 UTC
Description:
- CVE-2025-26465: fix vulnerability in OpenSSH when the VerifyHostKeyDNS option is enabled
- enlarge format buffer size for certificate serial number so the log message can record any 64-bit
integer without truncation (openssh bz#3012) [Orabug: 30448895]
Updated packages:
-
openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:1eb2bcc6011ac0dd87a6dd2f0507015b40362c4f6744ecbdd2d4fbbf85f72b5b
-
openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:fa2d5b9dc0ff2061c6c6751ba4764a9cc83c67b50e61b102c5b5d41208dde139
-
openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:92b6b79efc37c4ea15421a0ddeb4264ee48ca35e9a86601bc939d220b21650eb
-
openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:03d99c3840ae808016ea1c51380872e5b0dee02289feb5dcf56a649bd1887087
-
openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:7f23f5d6fc1cd2b80f70f1ed0ca047a122a77ba3d19b87fd6c9508987a633912
-
openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:b21e355f265615ee2556b0cec561fef1861fd8018f6964bb77166c8b949ba515
-
openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:42ac905c7a4a1fc4029c053bd408dc9ad573861866cf956f0505b907f3d8001b
-
openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:e4e72f59117b341afdc008bbf8203fc74e616cd16479a0b9ddc1334e6748e3db
-
pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.i686.rpm
sha:f0e05a8dfc4018d0f161748bf659fdec9afc3be647a2f686323e3a1de1a184f5
-
pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.x86_64.rpm
sha:669c189acf791907c2cd372d392d17634664061e83d5597ba46b7a2c66782cc3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.