- Thu Aug 11 2016 luigiwalser <luigiwalser> 6.6p1-5.9.mga5
+ Revision: 1045481
- use fedora patch that also includes fix for CVE-2016-6210 and related issue
- add upstream patch to fix CVE-2016-6515
- add patch from fedora to fix CVE-2015-8325
- start sshd.service after network-online.target (so it works with ListenAddress)
- add upstream patch to disable roaming (fixes CVE-2016-0777)
- disable scp progressmeter patch for now, as it breaks the build
- add patch from fedora with security fixes from upstream OpenSSH 7.0 release
- add patch from fedora to handle control chars in scp progressmeter (rhbz#1247204)
- add upstream patch to fix CVE-2015-5600
- rediff upstream patch to fix CVE-2015-5352
+ guillomovitch
- fix CVE 2016-3115
+ neoclust
- Fix wrapper path - Wed Oct 15 2014 umeabot <umeabot> 6.6p1-5.mga5
+ Revision: 747165
- Second Mageia 5 Mass Rebuild - Tue Sep 16 2014 umeabot <umeabot> 6.6p1-4.mga5
+ Revision: 683245
- Mageia 5 Mass Rebuild - Mon Aug 11 2014 wally <wally> 6.6p1-3.mga5
+ Revision: 661694
- when creating sshd system user use /sbin/nologin as login shell instead of /bin/true (every other system user we have uses /sbin/nologin or /bin/false, but not /bin/true) - Wed Apr 9 2014 luigiwalser <luigiwalser> 6.6p1-2.mga5
+ Revision: 613037
- add patch from debian to fix CVE-2014-2653 - Fri Mar 21 2014 guillomovitch <guillomovitch> 6.6p1-1.mga5
+ Revision: 606391
- new version 6.6p1 - Tue Feb 4 2014 guillomovitch <guillomovitch> 6.5p1-1.mga5
+ Revision: 582109
- new version 6.5p1 - Fri Nov 8 2013 oden <oden> 6.2p2-3.mga4
+ Revision: 549918
- P22: upstream security fix (http://www.openssh.com/txt/gcmrekey.adv) - Sat Oct 19 2013 umeabot <umeabot> 6.2p2-2.mga4
+ Revision: 528319
- Mageia 4 Mass Rebuild
+ oden
- ldap support was enabled
- add the ecdsa key as well
- fix the sourcing, so it actually works
- fix #7665, requires more fedora integration than that