[packages/openssh] - up to 6.7p1

arekm arekm at pld-linux.org
Tue Oct 7 16:15:10 CEST 2014


commit f6a10c3774a3ceb388a0818f190523ca372209c5
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date:   Tue Oct 7 16:15:07 2014 +0200

    - up to 6.7p1

 openssh-chroot.patch | 23 ++++++++++-------------
 openssh.spec         | 10 ++++------
 2 files changed, 14 insertions(+), 19 deletions(-)
---
diff --git a/openssh.spec b/openssh.spec
index 55d217d..ef673d8 100644
--- a/openssh.spec
+++ b/openssh.spec
@@ -33,13 +33,13 @@ Summary(pt_BR.UTF-8):	Implementação livre do SSH
 Summary(ru.UTF-8):	OpenSSH - свободная реализация протокола Secure Shell (SSH)
 Summary(uk.UTF-8):	OpenSSH - вільна реалізація протоколу Secure Shell (SSH)
 Name:		openssh
-Version:	6.6p1
-Release:	4
+Version:	6.7p1
+Release:	1
 Epoch:		2
 License:	BSD
 Group:		Applications/Networking
 Source0:	ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/%{name}-%{version}.tar.gz
-# Source0-md5:	3e9800e6bca1fbac0eea4d41baa7f239
+# Source0-md5:	3246aa79317b1d23cae783a3bf8275d6
 Source1:	http://www.mif.pg.gda.pl/homepages/ankry/man-PLD/%{name}-non-english-man-pages.tar.bz2
 # Source1-md5:	66943d481cc422512b537bcc2c7400d1
 Source2:	%{name}d.init
@@ -81,9 +81,8 @@ BuildRequires:	automake
 %{?with_kerberos5:BuildRequires:	heimdal-devel >= 0.7}
 %{?with_libedit:BuildRequires:	libedit-devel}
 %{?with_selinux:BuildRequires:	libselinux-devel}
-BuildRequires:	libwrap-devel
 %{?with_ldap:BuildRequires:	openldap-devel}
-BuildRequires:	openssl-devel >= 0.9.7d
+BuildRequires:	openssl-devel >= 0.9.8f
 BuildRequires:	pam-devel
 %{?with_gtk:BuildRequires:	pkgconfig}
 BuildRequires:	rpm >= 4.4.9-56
@@ -578,7 +577,6 @@ CPPFLAGS="%{rpmcppflags} -DCHROOT -std=gnu99"
 	--with-sandbox=seccomp_filter \
 %endif
 	%{?with_selinux:--with-selinux} \
-	--with-tcp-wrappers \
 %if "%{pld_release}" == "ac"
 	--with-xauth=/usr/X11R6/bin/xauth
 %else
diff --git a/openssh-chroot.patch b/openssh-chroot.patch
index 5dda773..3c93ac0 100644
--- a/openssh-chroot.patch
+++ b/openssh-chroot.patch
@@ -64,21 +64,21 @@
  					 * poke the client this often to
 --- ./session.c.org	2008-05-05 16:22:11.935003283 +0200
 +++ ./session.c	2008-05-05 16:32:50.025507650 +0200
-@@ -1345,6 +1345,10 @@ void
- do_setusercontext(struct passwd *pw)
- {
- 	char *chroot_path, *tmp;
+@@ -1492,6 +1492,10 @@ do_setusercontext(struct passwd *pw)
+ #ifdef USE_LIBIAF
+ 	int doing_chroot = 0;
+ #endif
 +#ifdef CHROOT
 +	char *user_dir;
 +	char *new_root;
 +#endif /* CHROOT */
  
- #ifdef WITH_SELINUX
- 	/* Cache selinux status for later use */
-@@ -1425,8 +1429,28 @@ do_setusercontext(struct passwd *pw)
- 			/* Make sure we don't attempt to chroot again */
- 			free(options.chroot_directory);
- 			options.chroot_directory = NULL;
+ 	platform_setusercontext(pw);
+ 
+@@ -1534,6 +1538,25 @@ do_setusercontext(struct passwd *pw)
+ #ifdef USE_LIBIAF
+ 			doing_chroot = 1;
+ #endif
 +#ifdef CHROOT
 +		} else if (options.use_chroot) {
 +			user_dir = xstrdup(pw->pw_dir);
@@ -100,10 +100,7 @@
 +#endif /* CHROOT */
  		}
  
-+
  #ifdef HAVE_LOGIN_CAP
- 		if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETUSER) < 0) {
- 			perror("unable to set user context (setuser)");
 --- openssh-3.7.1p2/sshd_config	2003-09-02 14:51:18.000000000 +0200
 +++ openssh-3.7.1p2.pius/sshd_config	2003-10-07 20:49:08.000000000 +0200
 @@ -91,6 +91,10 @@
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/openssh.git/commitdiff/f6a10c3774a3ceb388a0818f190523ca372209c5



More information about the pld-cvs-commit mailing list