openssh: Update from 7.1p2 to 7.2p1
This commit is contained in:
parent
c7d6e1faed
commit
8c37ff6bd0
@ -1,6 +1,6 @@
|
|||||||
TERMUX_PKG_HOMEPAGE=http://www.openssh.com/
|
TERMUX_PKG_HOMEPAGE=http://www.openssh.com/
|
||||||
TERMUX_PKG_DESCRIPTION="Secure shell for logging into a remote machine"
|
TERMUX_PKG_DESCRIPTION="Secure shell for logging into a remote machine"
|
||||||
TERMUX_PKG_VERSION=7.1p2
|
TERMUX_PKG_VERSION=7.2p1
|
||||||
TERMUX_PKG_SRCURL=http://ftp.eu.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${TERMUX_PKG_VERSION}.tar.gz
|
TERMUX_PKG_SRCURL=http://ftp.eu.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${TERMUX_PKG_VERSION}.tar.gz
|
||||||
TERMUX_PKG_DEPENDS="libandroid-support, ldns, openssl"
|
TERMUX_PKG_DEPENDS="libandroid-support, ldns, openssl"
|
||||||
# --disable-strip to prevent host "install" command to use "-s", which won't work for target binaries:
|
# --disable-strip to prevent host "install" command to use "-s", which won't work for target binaries:
|
||||||
|
@ -2,21 +2,21 @@ Avoid calling setgroups(2).
|
|||||||
|
|
||||||
Hardcode and do not require absolute path.
|
Hardcode and do not require absolute path.
|
||||||
|
|
||||||
diff -u -r ../openssh-6.6p1/sshd.c ./sshd.c
|
diff -u -r ../openssh-7.2p1/sshd.c ./sshd.c
|
||||||
--- ../openssh-6.6p1/sshd.c 2014-02-27 00:20:08.000000000 +0100
|
--- ../openssh-7.2p1/sshd.c 2016-02-25 22:40:04.000000000 -0500
|
||||||
+++ ./sshd.c 2014-06-04 13:25:00.476658070 +0200
|
+++ ./sshd.c 2016-02-29 02:36:00.863344328 -0500
|
||||||
@@ -647,8 +647,10 @@
|
@@ -644,8 +644,10 @@
|
||||||
do_setusercontext(privsep_pw);
|
debug3("privsep user:group %u:%u", (u_int)privsep_pw->pw_uid,
|
||||||
#else
|
(u_int)privsep_pw->pw_gid);
|
||||||
gidset[0] = privsep_pw->pw_gid;
|
gidset[0] = privsep_pw->pw_gid;
|
||||||
+#ifndef __ANDROID__
|
+#ifndef __ANDROID__
|
||||||
if (setgroups(1, gidset) < 0)
|
if (setgroups(1, gidset) < 0)
|
||||||
fatal("setgroups: %.100s", strerror(errno));
|
fatal("setgroups: %.100s", strerror(errno));
|
||||||
+#endif
|
+#endif
|
||||||
permanently_set_uid(privsep_pw);
|
permanently_set_uid(privsep_pw);
|
||||||
#endif
|
}
|
||||||
}
|
}
|
||||||
@@ -1403,7 +1405,8 @@
|
@@ -1487,7 +1489,8 @@
|
||||||
saved_argc = ac;
|
saved_argc = ac;
|
||||||
rexec_argc = ac;
|
rexec_argc = ac;
|
||||||
saved_argv = xcalloc(ac + 1, sizeof(*saved_argv));
|
saved_argv = xcalloc(ac + 1, sizeof(*saved_argv));
|
||||||
@ -26,7 +26,7 @@ diff -u -r ../openssh-6.6p1/sshd.c ./sshd.c
|
|||||||
saved_argv[i] = xstrdup(av[i]);
|
saved_argv[i] = xstrdup(av[i]);
|
||||||
saved_argv[i] = NULL;
|
saved_argv[i] = NULL;
|
||||||
|
|
||||||
@@ -1413,8 +1416,10 @@
|
@@ -1497,8 +1500,10 @@
|
||||||
av = saved_argv;
|
av = saved_argv;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@ -37,7 +37,7 @@ diff -u -r ../openssh-6.6p1/sshd.c ./sshd.c
|
|||||||
|
|
||||||
/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
|
/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
|
||||||
sanitise_stdfd();
|
sanitise_stdfd();
|
||||||
@@ -1543,8 +1548,6 @@
|
@@ -1628,8 +1633,6 @@
|
||||||
}
|
}
|
||||||
if (rexeced_flag || inetd_flag)
|
if (rexeced_flag || inetd_flag)
|
||||||
rexec_flag = 0;
|
rexec_flag = 0;
|
||||||
@ -46,7 +46,7 @@ diff -u -r ../openssh-6.6p1/sshd.c ./sshd.c
|
|||||||
if (rexeced_flag)
|
if (rexeced_flag)
|
||||||
closefrom(REEXEC_MIN_FREE_FD);
|
closefrom(REEXEC_MIN_FREE_FD);
|
||||||
else
|
else
|
||||||
@@ -1669,7 +1672,9 @@
|
@@ -1764,7 +1767,9 @@
|
||||||
free(privsep_pw->pw_passwd);
|
free(privsep_pw->pw_passwd);
|
||||||
privsep_pw->pw_passwd = xstrdup("*");
|
privsep_pw->pw_passwd = xstrdup("*");
|
||||||
}
|
}
|
||||||
@ -56,7 +56,7 @@ diff -u -r ../openssh-6.6p1/sshd.c ./sshd.c
|
|||||||
|
|
||||||
/* load host keys */
|
/* load host keys */
|
||||||
sensitive_data.host_keys = xcalloc(options.num_host_key_files,
|
sensitive_data.host_keys = xcalloc(options.num_host_key_files,
|
||||||
@@ -1838,8 +1843,10 @@
|
@@ -1948,8 +1953,10 @@
|
||||||
* to create a file, and we can't control the code in every
|
* to create a file, and we can't control the code in every
|
||||||
* module which might be used).
|
* module which might be used).
|
||||||
*/
|
*/
|
||||||
|
Loading…
Reference in New Issue
Block a user