SHA256
1
0
forked from pool/fail2ban
fail2ban/fail2ban-disable-iptables-w-option.patch
Arjen de Korte 974194c817 Accepting request 1010250 from home:polslinux:branches:security
- Update to 1.0.1:
  * https://github.com/fail2ban/fail2ban/blob/1.0.1/ChangeLog
- Remove fail2ban-0.11.2-upstream-patch-python-3.9.patch.
- Remove fail2ban-0.11.2-upstream-patch-for-CVE-2021-32749.patch.
- Remove fail2ban-rpmlintrc since it's no longer needed.
- Add fail2ban.keyring.

OBS-URL: https://build.opensuse.org/request/show/1010250
OBS-URL: https://build.opensuse.org/package/show/security/fail2ban?expand=0&rev=112
2022-10-12 14:29:51 +00:00

15 lines
725 B
Diff

--- fail2ban-1.0.1/config/action.d/iptables.conf.orig 2022-10-12 11:35:25.789327341 +0200
+++ fail2ban-1.0.1/config/action.d/iptables.conf 2022-10-12 11:35:40.585449861 +0200
@@ -138,8 +138,10 @@
# running concurrently and causing irratic behavior. -w was introduced
# in iptables 1.4.20, so might be absent on older systems
# See https://github.com/fail2ban/fail2ban/issues/1122
+# The default option "-w" can be used for openSUSE versions 13.2+ and
+# for updated versions of openSUSE 13.1; SLE 12 supports this option.
# Values: STRING
-lockingopt = -w
+lockingopt =
# Option: iptables
# Notes.: Actual command to be executed, including common to all calls options