summaryrefslogtreecommitdiff
path: root/debian/patches/user-group-modes.patch
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2015-09-17 13:52:46 +0100
committerColin Watson <cjwatson@debian.org>2015-09-17 13:53:40 +0100
commit748bb595047d10166322e716d3a760d2b055ba66 (patch)
tree1247866344795cc258034368c2fefd3e310cc257 /debian/patches/user-group-modes.patch
parentd22c47c8a36445a71470f3ed4ce2ef410348093b (diff)
parent48bcf47b091000fb3111b82385632d1401deb558 (diff)
ssh_config(5): Fix markup errors in description of GSSAPITrustDns (closes: #799271).
Diffstat (limited to 'debian/patches/user-group-modes.patch')
-rw-r--r--debian/patches/user-group-modes.patch6
1 files changed, 3 insertions, 3 deletions
diff --git a/debian/patches/user-group-modes.patch b/debian/patches/user-group-modes.patch
index 9213c1f29..cd6155d6a 100644
--- a/debian/patches/user-group-modes.patch
+++ b/debian/patches/user-group-modes.patch
@@ -1,4 +1,4 @@
1From 209c51110996719eab04236d72f776eed6bd8226 Mon Sep 17 00:00:00 2001 1From 8c6ce36545711e987fcab76a11f2110fdf9a7c8a Mon Sep 17 00:00:00 2001
2From: Colin Watson <cjwatson@debian.org> 2From: Colin Watson <cjwatson@debian.org>
3Date: Sun, 9 Feb 2014 16:09:58 +0000 3Date: Sun, 9 Feb 2014 16:09:58 +0000
4Subject: Allow harmless group-writability 4Subject: Allow harmless group-writability
@@ -252,10 +252,10 @@ index df7ac86..c84196f 100644
252 .It Pa ~/.ssh/environment 252 .It Pa ~/.ssh/environment
253 Contains additional definitions for environment variables; see 253 Contains additional definitions for environment variables; see
254diff --git a/ssh_config.5 b/ssh_config.5 254diff --git a/ssh_config.5 b/ssh_config.5
255index 21d3e94..1d0c52b 100644 255index 67e0dff..4e799cf 100644
256--- a/ssh_config.5 256--- a/ssh_config.5
257+++ b/ssh_config.5 257+++ b/ssh_config.5
258@@ -1706,6 +1706,8 @@ The format of this file is described above. 258@@ -1708,6 +1708,8 @@ The format of this file is described above.
259 This file is used by the SSH client. 259 This file is used by the SSH client.
260 Because of the potential for abuse, this file must have strict permissions: 260 Because of the potential for abuse, this file must have strict permissions:
261 read/write for the user, and not accessible by others. 261 read/write for the user, and not accessible by others.