Hello community,
here is the log from the commit of package openssh
checked in at Thu Dec 6 16:29:41 CET 2007.
--------
--- openssh/openssh-askpass-gnome.changes 2006-12-13 01:25:42.000000000 +0100
+++ /mounts/work_src_done/STABLE/openssh/openssh-askpass-gnome.changes 2007-12-05 10:56:17.000000000 +0100
@@ -1,0 +2,12 @@
+Wed Dec 5 10:56:07 CET 2007 - anicka@suse.cz
+
+- - update to 4.7p1
+ * Add "-K" flag for ssh to set GSSAPIAuthentication=yes and
+ GSSAPIDelegateCredentials=yes. This is symmetric with -k
+ * make scp try to skip FIFOs rather than blocking when nothing is
+ listening.
+ * increase default channel windows
+ * put the MAC list into a display
+ * many bugfixes
+
+-------------------------------------------------------------------
--- openssh/openssh.changes 2007-10-08 16:35:25.000000000 +0200
+++ /mounts/work_src_done/STABLE/openssh/openssh.changes 2007-12-05 10:55:57.000000000 +0100
@@ -1,0 +2,12 @@
+Wed Dec 5 10:45:36 CET 2007 - anicka@suse.cz
+
+- update to 4.7p1
+ * Add "-K" flag for ssh to set GSSAPIAuthentication=yes and
+ GSSAPIDelegateCredentials=yes. This is symmetric with -k
+ * make scp try to skip FIFOs rather than blocking when nothing is
+ listening.
+ * increase default channel windows
+ * put the MAC list into a display
+ * many bugfixes
+
+-------------------------------------------------------------------
Old:
----
openssh-4.6p1-addrlist.dif
openssh-4.6p1-askpass-fix.diff
openssh-4.6p1-audit.patch
openssh-4.6p1-blocksigalrm.diff
openssh-4.6p1-challenge.patch
openssh-4.6p1-default-protocol.diff
openssh-4.6p1.dif
openssh-4.6p1-eal3.diff
openssh-4.6p1-engines.diff
openssh-4.6p1-gcc-fix.patch
openssh-4.6p1-gssapimitm.patch
openssh-4.6p1-pam-fix2.diff
openssh-4.6p1-pam-fix3.diff
openssh-4.6p1-pwname-home.diff
openssh-4.6p1-saveargv-fix.diff
openssh-4.6p1-send_locale.diff
openssh-4.6p1-strict-aliasing-fix.diff
openssh-4.6p1.tar.bz2
openssh-4.6p1-tmpdir.diff
openssh-4.6p1-untrusted-cookie-CVE-2007-4752.diff
openssh-4.6p1-xauth.diff
openssh-4.6p1-xauthlocalhostname.diff
New:
----
openssh-4.7p1-addrlist.dif
openssh-4.7p1-askpass-fix.diff
openssh-4.7p1-audit.patch
openssh-4.7p1-blocksigalrm.diff
openssh-4.7p1-default-protocol.diff
openssh-4.7p1.dif
openssh-4.7p1-eal3.diff
openssh-4.7p1-engines.diff
openssh-4.7p1-gcc-fix.patch
openssh-4.7p1-gssapimitm.patch
openssh-4.7p1-pam-fix2.diff
openssh-4.7p1-pam-fix3.diff
openssh-4.7p1-pwname-home.diff
openssh-4.7p1-saveargv-fix.diff
openssh-4.7p1-send_locale.diff
openssh-4.7p1-strict-aliasing-fix.diff
openssh-4.7p1.tar.bz2
openssh-4.7p1-tmpdir.diff
openssh-4.7p1-xauth.diff
openssh-4.7p1-xauthlocalhostname.diff
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ openssh-askpass-gnome.spec ++++++
--- /var/tmp/diff_new_pack.M20520/_old 2007-12-06 16:28:37.000000000 +0100
+++ /var/tmp/diff_new_pack.M20520/_new 2007-12-06 16:28:37.000000000 +0100
@@ -1,5 +1,5 @@
#
-# spec file for package openssh-askpass-gnome (Version 4.6p1)
+# spec file for package openssh-askpass-gnome (Version 4.7p1)
#
# Copyright (c) 2007 SUSE LINUX Products GmbH, Nuernberg, Germany.
# This file and all modifications and additions to the pristine
@@ -14,8 +14,8 @@
BuildRequires: gtk2-devel krb5-devel opensc-devel openssh openssl-devel pam-devel tcpd-devel update-desktop-files
License: BSD 3-Clause
Group: Productivity/Networking/SSH
-Version: 4.6p1
-Release: 67
+Version: 4.7p1
+Release: 1
Requires: openssh = %{version} openssh-askpass = %{version}
AutoReqProv: on
Summary: A GNOME-Based Passphrase Dialog for OpenSSH
@@ -63,6 +63,7 @@
Damien Miller
%define prefix /usr
+
%prep
%setup -q -n %{_name}-%{version}
%patch
@@ -109,7 +110,17 @@
%files
%defattr(-,root,root)
%attr(0755,root,root) /usr/%_lib/ssh/gnome-ssh-askpass
+
%changelog
+* Wed Dec 05 2007 - anicka@suse.cz
+- - update to 4.7p1
+ * Add "-K" flag for ssh to set GSSAPIAuthentication=yes and
+ GSSAPIDelegateCredentials=yes. This is symmetric with -k
+ * make scp try to skip FIFOs rather than blocking when nothing is
+ listening.
+ * increase default channel windows
+ * put the MAC list into a display
+ * many bugfixes
* Tue Dec 12 2006 - anicka@suse.cz
- update to 4.5p1
* Use privsep_pw if we have it, but only require it if we
++++++ openssh.spec ++++++
--- /var/tmp/diff_new_pack.M20520/_old 2007-12-06 16:28:37.000000000 +0100
+++ /var/tmp/diff_new_pack.M20520/_new 2007-12-06 16:28:37.000000000 +0100
@@ -1,5 +1,5 @@
#
-# spec file for package openssh (Version 4.6p1)
+# spec file for package openssh (Version 4.7p1)
#
# Copyright (c) 2007 SUSE LINUX Products GmbH, Nuernberg, Germany.
# This file and all modifications and additions to the pristine
@@ -28,8 +28,8 @@
PreReq: /usr/sbin/groupadd /usr/sbin/useradd %insserv_prereq %fillup_prereq /bin/mkdir /bin/cat permissions
Conflicts: nonfreessh
AutoReqProv: on
-Version: 4.6p1
-Release: 60
+Version: 4.7p1
+Release: 1
%define xversion 1.2.4.1
Summary: Secure Shell Client and Server (Remote Login Program)
Url: http://www.openssh.com/
@@ -63,8 +63,6 @@
Patch42: %{name}-gssapi_krb5-fix.patch
Patch43: %{name}-%{version}-default-protocol.diff
Patch44: %{name}-%{version}-audit.patch
-Patch45: %{name}-%{version}-challenge.patch
-Patch46: %{name}-%{version}-untrusted-cookie-CVE-2007-4752.diff
BuildRoot: %{_tmppath}/%{name}-%{version}-build
%package askpass
@@ -134,6 +132,7 @@
Damien Miller
%define prefix /usr
+
%prep
%setup -q -b 3 -a 1 -a 5
%patch
@@ -155,8 +154,6 @@
%patch42
%patch43
%patch44 -p1
-%patch45
-%patch46
cp -v %{SOURCE4} .
cp -v %{SOURCE6} .
cd ../x11-ssh-askpass-%{xversion}
@@ -297,7 +294,17 @@
%doc %_mandir/man1/ssh-askpass.1x.gz
%doc %_mandir/man1/x11-ssh-askpass.1x.gz
%config %_appdefdir/SshAskpass
+
%changelog
+* Wed Dec 05 2007 - anicka@suse.cz
+- update to 4.7p1
+ * Add "-K" flag for ssh to set GSSAPIAuthentication=yes and
+ GSSAPIDelegateCredentials=yes. This is symmetric with -k
+ * make scp try to skip FIFOs rather than blocking when nothing is
+ listening.
+ * increase default channel windows
+ * put the MAC list into a display
+ * many bugfixes
* Mon Oct 08 2007 - anicka@suse.cz
- block SIGALRM only during calling syslog() [#331032]
* Thu Sep 13 2007 - nadvornik@suse.cz
++++++ openssh-4.6p1-addrlist.dif -> openssh-4.7p1-addrlist.dif ++++++
++++++ openssh-4.6p1-askpass-fix.diff -> openssh-4.7p1-askpass-fix.diff ++++++
++++++ openssh-4.6p1-audit.patch -> openssh-4.7p1-audit.patch ++++++
--- openssh/openssh-4.6p1-audit.patch 2007-10-08 16:24:36.000000000 +0200
+++ /mounts/work_src_done/STABLE/openssh/openssh-4.7p1-audit.patch 2007-12-05 09:55:39.000000000 +0100
@@ -1,26 +1,26 @@
# add support for Linux audit (FATE #120269)
================================================================================
---- openssh-4.6p1/Makefile.in
-+++ openssh-4.6p1/Makefile.in
-@@ -45,6 +45,7 @@
+--- openssh-4.7p1/Makefile.in
++++ openssh-4.7p1/Makefile.in
+@@ -44,6 +44,7 @@
+ CFLAGS=@CFLAGS@
CPPFLAGS=-I. -I$(srcdir) @CPPFLAGS@ $(PATHS) @DEFS@
LIBS=@LIBS@
- LIBSELINUX=@LIBSELINUX@
+LIBAUDIT=@LIBAUDIT@
SSHDLIBS=@SSHDLIBS@
LIBEDIT=@LIBEDIT@
- LIBPAM=@LIBPAM@
-@@ -139,7 +140,7 @@
+ AR=@AR@
+@@ -136,7 +137,7 @@
$(LD) -o $@ $(SSHOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
sshd$(EXEEXT): libssh.a $(LIBCOMPAT) $(SSHDOBJS)
-- $(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(LIBWRAP) $(LIBPAM) $(LIBSELINUX) $(SSHDLIBS) $(LIBS)
-+ $(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(LIBWRAP) $(LIBPAM) $(LIBSELINUX) $(LIBAUDIT) $(SSHDLIBS) $(LIBS)
+- $(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHDLIBS) $(LIBS)
++ $(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHDLIBS) $(LIBS) $(LIBAUDIT)
scp$(EXEEXT): $(LIBCOMPAT) libssh.a scp.o progressmeter.o
$(LD) -o $@ scp.o progressmeter.o bufaux.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
---- openssh-4.6p1/auth.c
-+++ openssh-4.6p1/auth.c
+--- openssh-4.7p1/auth.c
++++ openssh-4.7p1/auth.c
@@ -286,6 +286,12 @@
get_canonical_hostname(options.use_dns), "ssh", &loginmsg);
# endif
@@ -45,9 +45,9 @@
#ifdef SSH_AUDIT_EVENTS
audit_event(SSH_INVALID_USER);
#endif /* SSH_AUDIT_EVENTS */
---- openssh-4.6p1/config.h.in
-+++ openssh-4.6p1/config.h.in
-@@ -1305,6 +1305,9 @@
+--- openssh-4.7p1/config.h.in
++++ openssh-4.7p1/config.h.in
+@@ -1334,6 +1334,9 @@
/* Define if you want SELinux support. */
#undef WITH_SELINUX
@@ -57,11 +57,11 @@
/* Define to 1 if your processor stores words with the most significant byte
first (like Motorola and SPARC, unlike Intel and VAX). */
#undef WORDS_BIGENDIAN
---- openssh-4.6p1/configure.ac
-+++ openssh-4.6p1/configure.ac
-@@ -3170,6 +3170,20 @@
+--- openssh-4.7p1/configure.ac
++++ openssh-4.7p1/configure.ac
+@@ -3216,6 +3216,20 @@
+ fi ]
)
- AC_SUBST(LIBSELINUX)
+# Check whether user wants Linux audit support
+LINUX_AUDIT_MSG="no"
@@ -80,7 +80,7 @@
# Check whether user wants Kerberos 5 support
KRB5_MSG="no"
AC_ARG_WITH(kerberos5,
-@@ -3990,6 +4004,7 @@
+@@ -4036,6 +4050,7 @@
echo " OSF SIA support: $SIA_MSG"
echo " KerberosV support: $KRB5_MSG"
echo " SELinux support: $SELINUX_MSG"
@@ -88,9 +88,9 @@
echo " Smartcard support: $SCARD_MSG"
echo " S/KEY support: $SKEY_MSG"
echo " TCP Wrappers support: $TCPW_MSG"
---- openssh-4.6p1/loginrec.c
-+++ openssh-4.6p1/loginrec.c
-@@ -175,6 +175,10 @@
+--- openssh-4.7p1/loginrec.c
++++ openssh-4.7p1/loginrec.c
+@@ -176,6 +176,10 @@
#include "auth.h"
#include "buffer.h"
@@ -101,7 +101,7 @@
#ifdef HAVE_UTIL_H
# include
#endif
-@@ -201,6 +205,9 @@
+@@ -202,6 +206,9 @@
int utmpx_write_entry(struct logininfo *li);
int wtmp_write_entry(struct logininfo *li);
int wtmpx_write_entry(struct logininfo *li);
@@ -111,7 +111,7 @@
int lastlog_write_entry(struct logininfo *li);
int syslogin_write_entry(struct logininfo *li);
-@@ -439,6 +446,10 @@
+@@ -440,6 +447,10 @@
/* set the timestamp */
login_set_current_time(li);
@@ -122,7 +122,7 @@
#ifdef USE_LOGIN
syslogin_write_entry(li);
#endif
-@@ -1393,6 +1404,51 @@
+@@ -1394,6 +1405,51 @@
}
#endif /* USE_WTMPX */
@@ -174,8 +174,8 @@
/**
** Low-level libutil login() functions
**/
---- openssh-4.6p1/loginrec.h
-+++ openssh-4.6p1/loginrec.h
+--- openssh-4.7p1/loginrec.h
++++ openssh-4.7p1/loginrec.h
@@ -127,5 +127,9 @@
char *line_abbrevname(char *dst, const char *src, int dstsize);
++++++ openssh-4.6p1-blocksigalrm.diff -> openssh-4.7p1-blocksigalrm.diff ++++++
--- openssh/openssh-4.6p1-blocksigalrm.diff 2007-10-08 16:24:35.000000000 +0200
+++ /mounts/work_src_done/STABLE/openssh/openssh-4.7p1-blocksigalrm.diff 2007-12-05 10:20:58.000000000 +0100
@@ -1,6 +1,6 @@
--- log.c
+++ log.c
-@@ -50,6 +50,7 @@
+@@ -51,6 +51,7 @@
#include "xmalloc.h"
#include "log.h"
@@ -8,23 +8,15 @@
static LogLevel log_level = SYSLOG_LEVEL_INFO;
static int log_on_stderr = 1;
-@@ -313,6 +314,7 @@
+@@ -314,6 +315,7 @@
char fmtbuf[MSGBUFSIZ];
char *txt = NULL;
int pri = LOG_INFO;
+ sigset_t nset, oset;
+ int saved_errno = errno;
if (level > log_level)
- return;
-@@ -351,6 +353,7 @@
- pri = LOG_ERR;
- break;
- }
-+
- if (txt != NULL) {
- snprintf(fmtbuf, sizeof(fmtbuf), "%s: %s", txt, fmt);
- vsnprintf(msgbuf, sizeof(msgbuf), fmtbuf, args);
-@@ -363,6 +366,14 @@
+@@ -365,6 +367,14 @@
snprintf(msgbuf, sizeof msgbuf, "%s\r\n", fmtbuf);
write(STDERR_FILENO, msgbuf, strlen(msgbuf));
} else {
@@ -39,10 +31,11 @@
#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
openlog_r(argv0 ? argv0 : __progname, LOG_PID, log_facility, &sdata);
syslog_r(pri, &sdata, "%.500s", fmtbuf);
-@@ -372,5 +383,6 @@
+@@ -374,6 +384,7 @@
syslog(pri, "%.500s", fmtbuf);
closelog();
#endif
+ sigprocmask(SIG_SETMASK, &oset, NULL);
}
+ errno = saved_errno;
}
++++++ openssh-4.6p1-default-protocol.diff -> openssh-4.7p1-default-protocol.diff ++++++
--- openssh/openssh-4.6p1-default-protocol.diff 2007-10-08 16:24:36.000000000 +0200
+++ /mounts/work_src_done/STABLE/openssh/openssh-4.7p1-default-protocol.diff 2007-12-05 09:49:18.000000000 +0100
@@ -9,14 +9,3 @@
# Cipher 3des
# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
# EscapeChar ~
---- sshd_config
-+++ sshd_config
-@@ -11,7 +11,7 @@
- # default value.
-
- #Port 22
--#Protocol 2,1
-+Protocol 2
- #AddressFamily any
- #ListenAddress 0.0.0.0
- #ListenAddress ::
++++++ openssh-4.6p1-addrlist.dif -> openssh-4.7p1.dif ++++++
--- openssh/openssh-4.6p1-addrlist.dif 2007-03-12 10:53:56.000000000 +0100
+++ /mounts/work_src_done/STABLE/openssh/openssh-4.7p1.dif 2007-03-12 10:53:56.000000000 +0100
@@ -1,87 +1,45 @@
---- sshd.c
-+++ sshd.c
-@@ -253,6 +253,62 @@
+--- ssh_config
++++ ssh_config
+@@ -17,9 +17,20 @@
+ # list of available options, their meanings and defaults, please see the
+ # ssh_config(5) man page.
- static void do_ssh1_kex(void);
- static void do_ssh2_kex(void);
-+char * isaddr(struct addrinfo *addr, char *name);
-+void remove_duplicities(struct addrinfo *addr, char *port);
-+
-+/*
-+ * returns port if addr equals name
-+ */
-+
-+char*
-+isaddr(struct addrinfo *addr, char *name)
-+{
-+ char ntop[NI_MAXHOST];
-+ char *strport;
-+
-+ strport = (char*) malloc(NI_MAXSERV+1);
-+ if (getnameinfo(addr->ai_addr, addr->ai_addrlen,
-+ ntop, sizeof(ntop), strport, sizeof(strport),
-+ NI_NUMERICHOST|NI_NUMERICSERV) != 0) {
-+ error("getnameinfo failed");
-+ free(strport);
-+ return NULL;
-+ }
-+ if (!strcmp(ntop,name))
-+ return strport;
-+ else{
-+ free(strport);
-+ return NULL;
-+ }
-+
-+}
-+
-+/*
-+ * it removes all "0.0.0.0" elements with given port
-+ * from the list
-+ */
-+
-+void
-+remove_duplicities(struct addrinfo *ai_start, char *port)
-+{
-+ struct addrinfo *ai, *ai1, *aiprev, *ainext;
-+ char *port1;
-+
-+ aiprev=ai_start;
-+ for (ai = ai_start->ai_next; ai; ai = ainext) {
-+ ainext = ai->ai_next;
-+ port1 = isaddr(ai, "0.0.0.0");
-+ if (port1 && !strcmp(port,port1)){
-+ aiprev->ai_next = ainext;
-+ free(ai);
-+ free(port1);
-+ } else {
-+ if (port1)
-+ free(port1);
-+ aiprev = ai;
-+ }
-+ }
-+}
-
- /*
- * Close all listening sockets
-@@ -942,6 +998,7 @@
- int ret, listen_sock, on = 1;
- struct addrinfo *ai;
- char ntop[NI_MAXHOST], strport[NI_MAXSERV];
-+ char *port;
+-# Host *
++Host *
+ # ForwardAgent no
+ # ForwardX11 no
++
++# If you do not trust your remote host (or its administrator), you
++# should not forward X11 connections to your local X11-display for
++# security reasons: Someone stealing the authentification data on the
++# remote side (the "spoofed" X-server by the remote sshd) can read your
++# keystrokes as you type, just like any other X11 client could do.
++# Set this to "no" here for global effect or in your own ~/.ssh/config
++# file if you want to have the remote X11 authentification data to
++# expire after two minutes after remote login.
++ForwardX11Trusted yes
++
+ # RhostsRSAAuthentication no
+ # RSAAuthentication yes
+ # PasswordAuthentication yes
+--- sshd_config
++++ sshd_config
+@@ -82,7 +82,7 @@
- for (ai = options.listen_addrs; ai; ai = ai->ai_next) {
- if (ai->ai_family != AF_INET && ai->ai_family != AF_INET6)
-@@ -987,6 +1044,13 @@
- continue;
- }
- listen_socks[num_listen_socks] = listen_sock;
-+
-+ port = isaddr(ai,"::");
-+ if (port) {
-+ remove_duplicities(ai, port);
-+ free(port);
-+ }
-+
- num_listen_socks++;
+ #AllowTcpForwarding yes
+ #GatewayPorts no
+-#X11Forwarding no
++X11Forwarding yes
+ #X11DisplayOffset 10
+ #X11UseLocalhost yes
+ #PrintMotd yes
+--- sshlogin.c
++++ sshlogin.c
+@@ -126,6 +126,7 @@
- /* Start listening on the port. */
+ li = login_alloc_entry(pid, user, host, tty);
+ login_set_addr(li, addr, addrlen);
++ li->uid=uid;
+ login_login(li);
+ login_free_entry(li);
+ }
++++++ openssh-4.6p1-eal3.diff -> openssh-4.7p1-eal3.diff ++++++
++++++ openssh-4.6p1-engines.diff -> openssh-4.7p1-engines.diff ++++++
++++++ openssh-4.6p1-gcc-fix.patch -> openssh-4.7p1-gcc-fix.patch ++++++
++++++ openssh-4.6p1-gssapimitm.patch -> openssh-4.7p1-gssapimitm.patch ++++++
++++++ openssh-4.6p1-pam-fix2.diff -> openssh-4.7p1-pam-fix2.diff ++++++
++++++ openssh-4.6p1-pam-fix2.diff -> openssh-4.7p1-pam-fix3.diff ++++++
--- openssh/openssh-4.6p1-pam-fix2.diff 2007-03-12 10:53:56.000000000 +0100
+++ /mounts/work_src_done/STABLE/openssh/openssh-4.7p1-pam-fix3.diff 2007-03-12 10:53:58.000000000 +0100
@@ -1,20 +1,13 @@
---- sshd_config
-+++ sshd_config
-@@ -53,7 +53,7 @@
- #IgnoreRhosts yes
-
- # To disable tunneled clear text passwords, change to no here!
--#PasswordAuthentication yes
-+PasswordAuthentication no
- #PermitEmptyPasswords no
-
- # Change to no to disable s/key passwords
-@@ -78,7 +78,7 @@
- # If you just want the PAM account and session checks to run without
- # PAM authentication, then enable this but set PasswordAuthentication
- # and ChallengeResponseAuthentication to 'no'.
--#UsePAM no
-+UsePAM yes
-
- #AllowTcpForwarding yes
- #GatewayPorts no
+--- auth-pam.c
++++ auth-pam.c
+@@ -785,7 +785,9 @@
+ fatal("Internal error: PAM auth "
+ "succeeded when it should have "
+ "failed");
+- import_environments(&buffer);
++#ifndef USE_POSIX_THREADS
++ import_environments(&buffer);
++#endif
+ *num = 0;
+ **echo_on = 0;
+ ctxt->pam_done = 1;
++++++ openssh-4.6p1-pwname-home.diff -> openssh-4.7p1-pwname-home.diff ++++++
++++++ openssh-4.6p1-saveargv-fix.diff -> openssh-4.7p1-saveargv-fix.diff ++++++
++++++ openssh-4.6p1-send_locale.diff -> openssh-4.7p1-send_locale.diff ++++++
++++++ openssh-4.6p1-strict-aliasing-fix.diff -> openssh-4.7p1-strict-aliasing-fix.diff ++++++
++++++ openssh-4.6p1.tar.bz2 -> openssh-4.7p1.tar.bz2 ++++++
++++ 6235 lines of diff (skipped)
++++++ openssh-4.6p1-tmpdir.diff -> openssh-4.7p1-tmpdir.diff ++++++
++++++ openssh-4.6p1-xauth.diff -> openssh-4.7p1-xauth.diff ++++++
++++++ openssh-4.6p1-xauthlocalhostname.diff -> openssh-4.7p1-xauthlocalhostname.diff ++++++
++++++ openssh-gssapi_krb5-fix.patch ++++++
--- /var/tmp/diff_new_pack.M20520/_old 2007-12-06 16:28:39.000000000 +0100
+++ /var/tmp/diff_new_pack.M20520/_new 2007-12-06 16:28:39.000000000 +0100
@@ -1,6 +1,6 @@
--- configure.ac
+++ configure.ac
-@@ -3237,7 +3237,14 @@
+@@ -3283,7 +3283,14 @@
K5LIBS="-lgssapi $K5LIBS" ],
[ AC_CHECK_LIB(gssapi_krb5,gss_init_sec_context,
[ AC_DEFINE(GSSAPI)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Remember to have fun...
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-commit+help@opensuse.org