rpms/scponly/EL-4 scponly.spec,1.6,1.7
Toshio くらとみ (toshio)
fedora-extras-commits at redhat.com
Wed Feb 13 20:59:25 UTC 2008
- Previous message (by thread): rpms/scponly/F-8 scponly-4.6-CVE-2007-6415.patch, NONE, 1.1 scponly.spec, 1.7, 1.8
- Next message (by thread): rpms/eclipse-slide/devel .cvsignore, 1.3, 1.4 eclipse-slide.spec, 1.5, 1.6 sources, 1.5, 1.6
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: toshio
Update of /cvs/pkgs/rpms/scponly/EL-4
In directory cvs-int.fedora.redhat.com:/tmp/cvs-serv14877
Modified Files:
scponly.spec
Log Message:
* Wed Feb 13 2008 Tomas Hoger <thoger at redhat.com> - 4.6-10
- Add patch to prevent restriction bypass using OpenSSH's scp options -F
and -o (CVE-2007-6415, #426072)
- And fix for CVE-2007-6350
Index: scponly.spec
===================================================================
RCS file: /cvs/pkgs/rpms/scponly/EL-4/scponly.spec,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -r1.6 -r1.7
--- scponly.spec 27 Jun 2006 21:07:24 -0000 1.6
+++ scponly.spec 13 Feb 2008 20:58:50 -0000 1.7
@@ -1,12 +1,13 @@
Summary: Restricted shell for ssh based file services
Name: scponly
Version: 4.6
-Release: 5%{?dist}
+Release: 10%{?dist}
License: BSD
Group: Applications/Internet
URL: http://sublimation.org/scponly/
Source: http://sublimation.org/scponly/scponly-%{version}.tgz
Patch0: scponly-install.patch
+Patch1: scponly-4.6-CVE-2007-6415.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
# Checks only for location of binaries
@@ -24,10 +25,12 @@
%prep
%setup -q
%patch0 -p1
+%patch1 -p1 -b .CVE-2007-6415
%build
-%configure --enable-scp-compat --enable-rsync-compat --enable-winscp-compat \
- --enable-chrooted-binary
+%configure --enable-scp-compat --enable-winscp-compat --enable-chrooted-binary
+#--enable-rsync-compat
+
%{__make} %{?_smp_mflags} \
OPTS="%{optflags}"
@@ -55,6 +58,22 @@
%config(noreplace) %{_sysconfdir}/scponly/*
%changelog
+* Wed Feb 13 2008 Tomas Hoger <thoger at redhat.com> - 4.6-10
+- Add patch to prevent restriction bypass using OpenSSH's scp options -F
+ and -o (CVE-2007-6415, #426072)
+
+* Mon Feb 11 2008 Warren Togami <wtogami at redhat.com> - 4.6-9
+- rebuild with gcc-4.3
+
+* Tue Dec 11 2007 Toshio Kuratomi <a.badger at gmail.com> - 4.6-8
+- Disable rsync support due to security concerns: RH BZ#418201
+
+* Tue Aug 21 2007 Warren Togami <wtogami at redhat.com> - 4.6-7
+- rebuild
+
+* Fri Sep 15 2006 Warren Togami <wtogami at redhat.com> - 4.6-6
+- rebuild for FC6
+
* Tue Jun 27 2006 Toshio Kuratomi <toshio at tiki-lounge.com> - 4.6-5
- Add BR: openssh-server so sftp-server is present.
- Make source files nonexecutable so they are nonexecutable in debuginfo.
- Previous message (by thread): rpms/scponly/F-8 scponly-4.6-CVE-2007-6415.patch, NONE, 1.1 scponly.spec, 1.7, 1.8
- Next message (by thread): rpms/eclipse-slide/devel .cvsignore, 1.3, 1.4 eclipse-slide.spec, 1.5, 1.6 sources, 1.5, 1.6
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-extras-commits
mailing list