]> git.pld-linux.org Git - packages/openssh.git/commitdiff
- up to 6.7p1 auto/th/openssh-6.7p1-1
authorArkadiusz Miśkiewicz <arekm@maven.pl>
Tue, 7 Oct 2014 14:15:07 +0000 (16:15 +0200)
committerArkadiusz Miśkiewicz <arekm@maven.pl>
Tue, 7 Oct 2014 14:15:07 +0000 (16:15 +0200)
openssh-chroot.patch
openssh.spec

index 5dda773c02c44429a159adc01899ce1abf550be5..3c93ac0d5dc028f0d7575ab70f111aef800777b4 100644 (file)
                                         * poke the client this often to
 --- ./session.c.org    2008-05-05 16:22:11.935003283 +0200
 +++ ./session.c        2008-05-05 16:32:50.025507650 +0200
-@@ -1345,6 +1345,10 @@ void
- do_setusercontext(struct passwd *pw)
- {
-       char *chroot_path, *tmp;
+@@ -1492,6 +1492,10 @@ do_setusercontext(struct passwd *pw)
+ #ifdef USE_LIBIAF
+       int doing_chroot = 0;
+ #endif
 +#ifdef CHROOT
 +      char *user_dir;
 +      char *new_root;
 +#endif /* CHROOT */
  
- #ifdef WITH_SELINUX
-       /* Cache selinux status for later use */
-@@ -1425,8 +1429,28 @@ do_setusercontext(struct passwd *pw)
-                       /* Make sure we don't attempt to chroot again */
-                       free(options.chroot_directory);
-                       options.chroot_directory = NULL;
+       platform_setusercontext(pw);
+@@ -1534,6 +1538,25 @@ do_setusercontext(struct passwd *pw)
+ #ifdef USE_LIBIAF
+                       doing_chroot = 1;
+ #endif
 +#ifdef CHROOT
 +              } else if (options.use_chroot) {
 +                      user_dir = xstrdup(pw->pw_dir);
 +#endif /* CHROOT */
                }
  
-+
  #ifdef HAVE_LOGIN_CAP
-               if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETUSER) < 0) {
-                       perror("unable to set user context (setuser)");
 --- openssh-3.7.1p2/sshd_config        2003-09-02 14:51:18.000000000 +0200
 +++ openssh-3.7.1p2.pius/sshd_config   2003-10-07 20:49:08.000000000 +0200
 @@ -91,6 +91,10 @@
index 55d217d1ee34eaef530b08e2002bbca3b2bcf1b5..ef673d8a6681a2bbbbab12128bd681e6a96a2ee4 100644 (file)
@@ -33,13 +33,13 @@ Summary(pt_BR.UTF-8):       Implementação livre do SSH
 Summary(ru.UTF-8):     OpenSSH - свободная реализация протокола Secure Shell (SSH)
 Summary(uk.UTF-8):     OpenSSH - вільна реалізація протоколу Secure Shell (SSH)
 Name:          openssh
-Version:       6.6p1
-Release:       4
+Version:       6.7p1
+Release:       1
 Epoch:         2
 License:       BSD
 Group:         Applications/Networking
 Source0:       ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/%{name}-%{version}.tar.gz
-# Source0-md5: 3e9800e6bca1fbac0eea4d41baa7f239
+# Source0-md5: 3246aa79317b1d23cae783a3bf8275d6
 Source1:       http://www.mif.pg.gda.pl/homepages/ankry/man-PLD/%{name}-non-english-man-pages.tar.bz2
 # Source1-md5: 66943d481cc422512b537bcc2c7400d1
 Source2:       %{name}d.init
@@ -81,9 +81,8 @@ BuildRequires:        automake
 %{?with_kerberos5:BuildRequires:       heimdal-devel >= 0.7}
 %{?with_libedit:BuildRequires: libedit-devel}
 %{?with_selinux:BuildRequires: libselinux-devel}
-BuildRequires: libwrap-devel
 %{?with_ldap:BuildRequires:    openldap-devel}
-BuildRequires: openssl-devel >= 0.9.7d
+BuildRequires: openssl-devel >= 0.9.8f
 BuildRequires: pam-devel
 %{?with_gtk:BuildRequires:     pkgconfig}
 BuildRequires: rpm >= 4.4.9-56
@@ -578,7 +577,6 @@ CPPFLAGS="%{rpmcppflags} -DCHROOT -std=gnu99"
        --with-sandbox=seccomp_filter \
 %endif
        %{?with_selinux:--with-selinux} \
-       --with-tcp-wrappers \
 %if "%{pld_release}" == "ac"
        --with-xauth=/usr/X11R6/bin/xauth
 %else
This page took 0.241697 seconds and 4 git commands to generate.