forked from rpms/openssh
Unpatch Red Hat help message
This commit is contained in:
parent
90b7a2efcd
commit
f38f4e0ef0
@ -54,7 +54,7 @@
|
||||
Summary: An open source implementation of SSH protocol version 2
|
||||
Name: openssh
|
||||
Version: %{openssh_ver}
|
||||
Release: %{openssh_rel}%{?dist}
|
||||
Release: %{openssh_rel}%{?dist}.alma.1
|
||||
URL: http://www.openssh.com/portable.html
|
||||
#URL1: https://github.com/jbeverly/pam_ssh_agent_auth/
|
||||
Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
|
||||
@ -293,7 +293,7 @@ Patch1019: openssh-9.6p1-CVE-2023-51385.patch
|
||||
#upstream commit 96faa0de6c673a2ce84736eba37fc9fb723d9e5c
|
||||
Patch1020: openssh-8.7p1-sigpipe.patch
|
||||
Patch1021: openssh-9.8p1-upstream-cve-2024-6387.patch
|
||||
Patch1022: openssh-8.7p1-redhat-help.patch
|
||||
#Patch1022: openssh-8.7p1-redhat-help.patch
|
||||
Patch1023: openssh-8.7p1-openssl-log.patch
|
||||
#upstream commit 52dfe3c72d98503d8b7c6f64fc7e19d685636c0b
|
||||
Patch1024: openssh-8.7p1-allow-duplicate-subsystem.patch
|
||||
@ -526,7 +526,7 @@ popd
|
||||
%patch1019 -p1 -b .cve-2023-51385
|
||||
%patch1020 -p1 -b .earlypipe
|
||||
%patch1021 -p1 -b .cve-2024-6387
|
||||
%patch1022 -p1 -b .redhat-help
|
||||
#%patch1022 -p1 -b .redhat-help
|
||||
%patch1023 -p1 -b .openssl-log
|
||||
%patch1024 -p1 -b .allow-dup-subsystem
|
||||
%patch1025 -p1 -b .errcode_set
|
||||
@ -817,6 +817,9 @@ test -f %{sysconfig_anaconda} && \
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Thu Jun 19 2025 Koichiro Iwao <meta@almalinux.org> - 8.7p1-45.alma.1
|
||||
- Unpatch Red Hat help message
|
||||
|
||||
* Tue Feb 18 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 8.7p1-45
|
||||
- Fix missing error codes set and invalid error code checks in OpenSSH. It
|
||||
prevents memory exhaustion attack and a MITM attack when VerifyHostKeyDNS
|
||||
|
Loading…
Reference in New Issue
Block a user