From patchwork Wed Apr 15 14:04:33 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: auh@yoctoproject.org X-Patchwork-Id: 86064 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2006EFA0C5E for ; Wed, 15 Apr 2026 14:04:37 +0000 (UTC) Received: from a27-191.smtp-out.us-west-2.amazonses.com (a27-191.smtp-out.us-west-2.amazonses.com [54.240.27.191]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.19813.1776261873951630950 for ; Wed, 15 Apr 2026 07:04:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@yoctoproject.org header.s=j46ser6a2yusdzubpv7m7ewqgesde2ie header.b=sUAlhMuU; dkim=pass header.i=@amazonses.com header.s=hsbnp7p3ensaochzwyq5wwmceodymuwv header.b=J1uQ7pCV; spf=pass (domain: us-west-2.amazonses.com, ip: 54.240.27.191, mailfrom: 0101019d91753e91-f7599efe-cef1-4317-8170-5f39a2b27e98-000000@us-west-2.amazonses.com) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=j46ser6a2yusdzubpv7m7ewqgesde2ie; d=yoctoproject.org; t=1776261873; h=Content-Type:MIME-Version:From:To:Cc:Subject:Message-Id:Date; bh=/Jt8xro4qAANaZ5H7lTutHPbEqo88lMunuhTvVc/7I8=; b=sUAlhMuU2JlTNofxIRfFao+zVYyMiAy2oVfYFERG+W8o8JetjEuZCYAiI06XpSwq 6F6ezytGVNFGODMUfHkU8mPANe5F96gb+r+0urGQu77EodUt87WfYb0vvZxB68l4sM2 xtc826/MH9i1nN+n6bStYKGKUysKYSd4yuPfP/vE= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=hsbnp7p3ensaochzwyq5wwmceodymuwv; d=amazonses.com; t=1776261873; h=Content-Type:MIME-Version:From:To:Cc:Subject:Message-Id:Date:Feedback-ID; bh=/Jt8xro4qAANaZ5H7lTutHPbEqo88lMunuhTvVc/7I8=; b=J1uQ7pCVEOZwbtJrGuXfuIqweNLq51Ug0mcjcLXAovGeERa7reAwOy6VBsfp0UIU TJnqGz5T2z3oOHcKp48uKupCyKdwMliCRhQ4raq8hpkYzqpm+b7XifOn6iHvhKU51H5 rgYinNPdeic8t8VeLI/T10GUoHj/3kds9THD/1OA= MIME-Version: 1.0 From: auh@yoctoproject.org To: openembedded-core@lists.openembedded.org Cc: Subject: [AUH] openssh: upgrading to 10.3p1 SUCCEEDED Message-ID: <0101019d91753e91-f7599efe-cef1-4317-8170-5f39a2b27e98-000000@us-west-2.amazonses.com> Date: Wed, 15 Apr 2026 14:04:33 +0000 Feedback-ID: ::1.us-west-2.9np3MYPs3fEaOBysGKSlUD4KtcmPijcmS9Az2Hwf7iQ=:AmazonSES X-SES-Outgoing: 2026.04.15-54.240.27.191 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Wed, 15 Apr 2026 14:04:37 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235217 Hello, this email is a notification from the Auto Upgrade Helper that the automatic attempt to upgrade the recipe(s) *openssh* to *10.3p1* has Succeeded. Next steps: - apply the patch: git am 0001-openssh-upgrade-10.2p1-10.3p1.patch - check the changes to upstream patches and summarize them in the commit message, - compile an image that contains the package - perform some basic sanity tests - amend the patch and sign it off: git commit -s --reset-author --amend - send it to the appropriate mailing list Alternatively, if you believe the recipe should not be upgraded at this time, you can fill RECIPE_NO_UPDATE_REASON in respective recipe file so that automatic upgrades would no longer be attempted. Please review the attached files for further information and build/update failures. Any problem please file a bug at https://bugzilla.yoctoproject.org/enter_bug.cgi?product=Automated%20Update%20Handler Regards, The Upgrade Helper -- >8 -- From 66a3b88030e73641d4a40ce2eff15f4e73d528c4 Mon Sep 17 00:00:00 2001 From: Upgrade Helper Date: Wed, 15 Apr 2026 06:36:25 +0000 Subject: [PATCH] openssh: upgrade 10.2p1 -> 10.3p1 --- ...1-regress-banner.sh-log-input-and-output-files-on-erro.patch | 2 +- .../openssh/{openssh_10.2p1.bb => openssh_10.3p1.bb} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-connectivity/openssh/{openssh_10.2p1.bb => openssh_10.3p1.bb} (99%) diff --git a/meta/recipes-connectivity/openssh/openssh/0001-regress-banner.sh-log-input-and-output-files-on-erro.patch b/meta/recipes-connectivity/openssh/openssh/0001-regress-banner.sh-log-input-and-output-files-on-erro.patch index f424288e37..e344c3b60f 100644 --- a/meta/recipes-connectivity/openssh/openssh/0001-regress-banner.sh-log-input-and-output-files-on-erro.patch +++ b/meta/recipes-connectivity/openssh/openssh/0001-regress-banner.sh-log-input-and-output-files-on-erro.patch @@ -1,4 +1,4 @@ -From 5cc897fe2effe549e1e280c2f606bce8b532b61e Mon Sep 17 00:00:00 2001 +From fa13753f8592600e35028115ec38f62affb9a565 Mon Sep 17 00:00:00 2001 From: Mikko Rapeli Date: Mon, 11 Sep 2023 09:55:21 +0100 Subject: [PATCH] regress/banner.sh: log input and output files on error diff --git a/meta/recipes-connectivity/openssh/openssh_10.2p1.bb b/meta/recipes-connectivity/openssh/openssh_10.3p1.bb similarity index 99% rename from meta/recipes-connectivity/openssh/openssh_10.2p1.bb rename to meta/recipes-connectivity/openssh/openssh_10.3p1.bb index 96cb09acc0..a050475532 100644 --- a/meta/recipes-connectivity/openssh/openssh_10.2p1.bb +++ b/meta/recipes-connectivity/openssh/openssh_10.3p1.bb @@ -25,7 +25,7 @@ SRC_URI = "https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.ta file://sshd_check_keys \ file://0001-regress-banner.sh-log-input-and-output-files-on-erro.patch \ " -SRC_URI[sha256sum] = "ccc42c0419937959263fa1dbd16dafc18c56b984c03562d2937ce56a60f798b2" +SRC_URI[sha256sum] = "56682a36bb92dcf4b4f016fd8ec8e74059b79a8de25c15d670d731e7d18e45f4" CVE_STATUS[CVE-2007-2768] = "not-applicable-config: This CVE is specific to OpenSSH with the pam opie which we don't build/use here."