diff options
author | Lars Wendler <polynomial-c@gentoo.org> | 2016-01-14 16:30:58 +0100 |
---|---|---|
committer | Lars Wendler <polynomial-c@gentoo.org> | 2016-01-14 16:31:15 +0100 |
commit | ad9f88e38be8085905214a94bc48913b095bd85a (patch) | |
tree | 58ff21415746ac4a49f566a06a666919f04d7668 /net-misc/openssh/files | |
parent | sci-electronics/qelectrotech: update LICENSE (diff) | |
download | gentoo-ad9f88e38be8085905214a94bc48913b095bd85a.tar.gz gentoo-ad9f88e38be8085905214a94bc48913b095bd85a.tar.bz2 gentoo-ad9f88e38be8085905214a94bc48913b095bd85a.zip |
net-misc/openssh: Security bump for CVE-2016-0777 (bug #571892).
Package-Manager: portage-2.2.26
Signed-off-by: Lars Wendler <polynomial-c@gentoo.org>
Diffstat (limited to 'net-misc/openssh/files')
-rw-r--r-- | net-misc/openssh/files/openssh-7.1_p1-CVE-2016-0777.patch | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/net-misc/openssh/files/openssh-7.1_p1-CVE-2016-0777.patch b/net-misc/openssh/files/openssh-7.1_p1-CVE-2016-0777.patch new file mode 100644 index 000000000000..90125dd8e5f8 --- /dev/null +++ b/net-misc/openssh/files/openssh-7.1_p1-CVE-2016-0777.patch @@ -0,0 +1,33 @@ +--- openssh-7.1p1/readconf.c ++++ openssh-7.1p1/readconf.c +@@ -1660,7 +1660,7 @@ + options->tun_remote = -1; + options->local_command = NULL; + options->permit_local_command = -1; +- options->use_roaming = -1; ++ options->use_roaming = 0; + options->visual_host_key = -1; + options->ip_qos_interactive = -1; + options->ip_qos_bulk = -1; +@@ -1833,8 +1833,7 @@ + options->tun_remote = SSH_TUNID_ANY; + if (options->permit_local_command == -1) + options->permit_local_command = 0; +- if (options->use_roaming == -1) +- options->use_roaming = 1; ++ options->use_roaming = 0; + if (options->visual_host_key == -1) + options->visual_host_key = 0; + if (options->ip_qos_interactive == -1) +--- openssh-7.1p1/ssh.c ++++ openssh-7.1p1/ssh.c +@@ -1932,9 +1932,6 @@ + fork_postauth(); + } + +- if (options.use_roaming) +- request_roaming(); +- + return client_loop(tty_flag, tty_flag ? + options.escape_char : SSH_ESCAPECHAR_NONE, id); + } |