Debian Patches
Status for pam-ssh-agent-auth/0.10.3-11
Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
0001-authfd.c-check-return-value-of-seteuid-2.patch | [PATCH] authfd.c: check return value of seteuid(2) Ensure the call to seteuid(2) succeeds. As the linux man page rather ominously states: Note: there are cases where seteuid() can fail even when the caller is UID 0; it is a grave security error to omit checking for a failure return from seteuid(). |
Michael Santos <michael.santos@gmail.com> | no | 2017-03-31 | ||
0002-fix-segfault-when-using-ECDSA-keys.patch | [PATCH] fix segfault when using ECDSA keys. | Marc Deslauriers <marc.deslauriers@canonical.com> | no | 2020-06-11 | ||
1000-clean-ed25519.patch | Fix clean target to make package rebuildable. Without this change, the $(ED25519OBJS) object is left behind after cleaning. =================================================================== |
Petter Reinholdtsen | no | 2024-04-16 | ||
1000-gcc-14.patch | Avoided incompatible pointer passing to fix GCC 14 build errors. Add missing 'const', cast to expected pointer type (DSA_SIG) and avoid pointer to pointer when pointer is required. |
Petter Reinholdtsen <pere@debian.org> | no | debian | 2024-11-05 | |
fingerprint_sha256.patch | Switch key fingerprint hash algorithm from MD5 to SHA256. Use the newer base64 encoding format introduced in OpenSSH 6.8 to produce fingerprints compatible with ssh-keygen -l. =================================================================== |
Tobias Heider <tobias.heider@canonical.com> | yes | debian upstream | ||
fix-configure.patch | no | |||||
openssl-1.1.1-1.patch | [PATCH 1/2] Adapt to OpenSSL 1.1.1. The FreeBSD operating system is migrating to OpenSSL 1.1.1 and I have created this set of patches to make pam_ssh_agent_auth compile with it. The patch comments out some parts of include files which are not actually used and reference now opaque OpenSSL internals. I also have migrated the source files to use accessors to use the OpenSSL objects. The patch works on FreeBSD head (will be 12.0) but the --without-openssl-header-check argument is required in configure there. |
Guido Falsi <mad@madpilot.net> | no | 2018-10-20 | ||
openssl-1.1.1-2.patch | [PATCH 2/2] Check against the correct OPENSSL_VERSION_NUMBER Alexey Dokuchaev (a fellow FreeBSD developer) pointed out to me the opaque structures were introduced in 1.1.0-pre 5, so the correct OPENSSL_VERSION_NUMBER to discriminate is 0x10100005L. |
Guido Falsi <mad@madpilot.net> | no | 2018-10-24 |
Showing 1 to 8 of 8 entries