File CVE-2016-077-7_8.patch of Package openssh.363

diff -up ./readconf.c.orig-roam ./readconf.c
--- ./readconf.c.orig-roam	2016-01-15 11:06:05.729015889 +0100
+++ ./readconf.c	2016-01-15 11:06:12.176926212 +0100
@@ -1159,7 +1159,7 @@ initialize_options(Options * options)
 	options->tun_remote = -1;
 	options->local_command = NULL;
 	options->permit_local_command = -1;
-	options->use_roaming = -1;
+	options->use_roaming = 0;
 	options->visual_host_key = -1;
 	options->zero_knowledge_password_authentication = -1;
 	options->ip_qos_interactive = -1;
@@ -1314,8 +1314,7 @@ fill_default_options(Options * options)
 		options->tun_remote = SSH_TUNID_ANY;
 	if (options->permit_local_command == -1)
 		options->permit_local_command = 0;
-	if (options->use_roaming == -1)
-		options->use_roaming = 1;
+	options->use_roaming = 0;
 	if (options->visual_host_key == -1)
 		options->visual_host_key = 0;
 	if (options->zero_knowledge_password_authentication == -1)
diff -up ./ssh.c.orig-roam ./ssh.c
--- ./ssh.c.orig-roam	2016-01-15 11:06:05.749015611 +0100
+++ ./ssh.c	2016-01-15 11:06:26.654724857 +0100
@@ -1440,9 +1440,6 @@ ssh_session2(void)
 			fork_postauth();
 	}
 
-	if (options.use_roaming)
-		request_roaming();
-
 	return client_loop(tty_flag, tty_flag ?
 	    options.escape_char : SSH_ESCAPECHAR_NONE, id);
 }
openSUSE Build Service is sponsored by