Bug 2051551 - authorized_keys_command= is passing wrong username argument when used in /etc/pam.d/su-l
Summary: authorized_keys_command= is passing wrong username argument when used in /etc...
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 9
Classification: Red Hat
Component: openssh
Version: 9.0
Hardware: Unspecified
OS: Unspecified
low
low
Target Milestone: rc
: ---
Assignee: Dmitry Belyavskiy
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-02-07 13:35 UTC by Dmitry Belyavskiy
Modified: 2023-08-07 07:28 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-08-07 07:28:19 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Github jbeverly pam_ssh_agent_auth issues 34 0 None open authorized_keys_command= is passing wrong username argument when used in /etc/pam.d/su-l 2022-02-07 13:35:31 UTC
Red Hat Issue Tracker CRYPTO-7457 0 None None None 2022-06-03 14:31:40 UTC
Red Hat Issue Tracker RHELPLAN-111350 0 None None None 2022-02-07 13:38:04 UTC

Comment 2 Dmitry Belyavskiy 2023-08-01 13:19:31 UTC
Needs a separate evaluation together with other minor pam_ssh_agent stuff

Comment 3 RHEL Program Management 2023-08-07 07:28:19 UTC
After evaluating this issue, there are no plans to address it further or fix it in an upcoming release.  Therefore, it is being closed.  If plans change such that this issue will be fixed in an upcoming release, then the bug can be reopened.


Note You need to log in before you can comment on or make changes to this bug.