From patchwork Thu Dec 30 21:31:18 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 1933 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A93CDC433F5 for ; Thu, 30 Dec 2021 21:31:29 +0000 (UTC) Received: from mail-pg1-f171.google.com (mail-pg1-f171.google.com [209.85.215.171]) by mx.groups.io with SMTP id smtpd.web10.3869.1640899889291621895 for ; Thu, 30 Dec 2021 13:31:29 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=fa3jfnf4; spf=pass (domain: gmail.com, ip: 209.85.215.171, mailfrom: akuster808@gmail.com) Received: by mail-pg1-f171.google.com with SMTP id g22so22376262pgn.1 for ; Thu, 30 Dec 2021 13:31:29 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=4Nw7yGMqa5ex1HRV7blywW+eDXdzeMvKpc/uhZOC6OQ=; b=fa3jfnf4tofUvzF/krTlUxhiv+rgyJLy55AAmf6pBHd0LPOJhj5hBKhWGM2xkZ78Sd sb2Gy0Hr88B+WZN4eWVNn+wURmpcQsk168fwNxKOusHB7mXsGdKEHMsQlosclTUX9X74 6lIEpUv+QaflK5YD5JN/B9dd0JJOpU5uI+3CnijP9sD7R3sFk6jR+kj74eDXo6gbwmrD Yofg91iKGmgTJWmjGtrrEKb+D2OmkNfFZZ53VuDA7T+S0oU37gQt8IYgwQDrr48wilS1 gxVahuFM0NPOlmZxm4u/H4Auw5koR+0hb0b1AmYX9aRoXDgcJrnICuviXTeaFbyCCZtZ N+Nw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=4Nw7yGMqa5ex1HRV7blywW+eDXdzeMvKpc/uhZOC6OQ=; b=kFHtb1FvZ70c+8mpYRaUS/eJo9/qfqcb7vFBK96I+8YPoAZCtN2UDlJ4X64+XvTYFX Kwp3kJNg88tKTOqq83oxH0MQigu/PwEKqk7LVfUGysmX+x2k0q396zU9kaIzdXuqYo0J lLPuIe8X9pR+mJWpKREFMgp3xBH6q6ifNkWQLPdkRWyGOp1J69jYW7XWVL2TjvvF7Jdo ZwGZoGRW7G7U/c41ph6QPF1OAkGS5vGHtYJJ1p3IzwgfpMlIPZH0R4a+zfd+zvAKECCD Ib42ergcxwX6+nmtt4mzO3aYjn86cbyg9p+9ttqjPZfJGDlrrkxECPUMrSCe5Tb+rYxY X1Ew== X-Gm-Message-State: AOAM533tteVtnTFVxqHZsTW5Hbq1QwcQ6xhF3RRMqLG0/TQRBtrziuLv fx4lKUdALqikG+VjNkr5skMAYyPtqNQ= X-Google-Smtp-Source: ABdhPJw9OsrF+YT+QHcyRPV5NNJmwjQMNTd4DDuVyLZfHPhE+DSRjfjC1u81G7woKCziwKw1qCGBsg== X-Received: by 2002:a63:384d:: with SMTP id h13mr10293298pgn.472.1640899888310; Thu, 30 Dec 2021 13:31:28 -0800 (PST) Received: from keaua.caveonetworks.com ([2601:202:4180:a5c0:a625:8af4:d190:e823]) by smtp.gmail.com with ESMTPSA id t27sm9348384pgm.52.2021.12.30.13.31.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Dec 2021 13:31:27 -0800 (PST) From: Armin Kuster To: openembedded-devel@lists.openembedded.org Subject: [Honister 2/7] postgresql: fix CVE-2021-23214,CVE-2021-23222 Date: Thu, 30 Dec 2021 13:31:18 -0800 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Dec 2021 21:31:29 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/94571 From: Changqing Li Signed-off-by: Changqing Li Signed-off-by: Armin Kuster Signed-off-by: Khem Raj (cherry picked from commit 8e57fb9b1e4da504ceeaadcff2fe38555a47b6b6) Signed-off-by: Armin Kuster --- .../postgresql/files/CVE-2021-23214.patch | 116 ++++++++++++++++ .../postgresql/files/CVE-2021-23222.patch | 131 ++++++++++++++++++ .../recipes-dbs/postgresql/postgresql_13.4.bb | 2 + 3 files changed, 249 insertions(+) create mode 100644 meta-oe/recipes-dbs/postgresql/files/CVE-2021-23214.patch create mode 100644 meta-oe/recipes-dbs/postgresql/files/CVE-2021-23222.patch diff --git a/meta-oe/recipes-dbs/postgresql/files/CVE-2021-23214.patch b/meta-oe/recipes-dbs/postgresql/files/CVE-2021-23214.patch new file mode 100644 index 0000000000..58bf810626 --- /dev/null +++ b/meta-oe/recipes-dbs/postgresql/files/CVE-2021-23214.patch @@ -0,0 +1,116 @@ +From 24c2b9e42edb6d2f4ef2cead3b0aa1d6196adfce Mon Sep 17 00:00:00 2001 +From: Tom Lane +Date: Mon, 8 Nov 2021 11:01:43 -0500 +Subject: [PATCH 2/2] Reject extraneous data after SSL or GSS encryption + handshake. + +The server collects up to a bufferload of data whenever it reads data +from the client socket. When SSL or GSS encryption is requested +during startup, any additional data received with the initial +request message remained in the buffer, and would be treated as +already-decrypted data once the encryption handshake completed. +Thus, a man-in-the-middle with the ability to inject data into the +TCP connection could stuff some cleartext data into the start of +a supposedly encryption-protected database session. + +This could be abused to send faked SQL commands to the server, +although that would only work if the server did not demand any +authentication data. (However, a server relying on SSL certificate +authentication might well not do so.) + +To fix, throw a protocol-violation error if the internal buffer +is not empty after the encryption handshake. + +Our thanks to Jacob Champion for reporting this problem. + +Security: CVE-2021-23214 + +Upstream-Status: Backport[https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951] +CVE: CVE-2021-23214 + +Signed-off-by: Changqing Li + +--- + src/backend/libpq/pqcomm.c | 11 +++++++++++ + src/backend/postmaster/postmaster.c | 23 ++++++++++++++++++++++- + src/include/libpq/libpq.h | 1 + + 3 files changed, 34 insertions(+), 1 deletion(-) + +diff --git a/src/backend/libpq/pqcomm.c b/src/backend/libpq/pqcomm.c +index ee2cd86..4dd1c02 100644 +--- a/src/backend/libpq/pqcomm.c ++++ b/src/backend/libpq/pqcomm.c +@@ -1183,6 +1183,17 @@ pq_getstring(StringInfo s) + } + } + ++/* ------------------------------- ++ * pq_buffer_has_data - is any buffered data available to read? ++ * ++ * This will *not* attempt to read more data. ++ * -------------------------------- ++ */ ++bool ++pq_buffer_has_data(void) ++{ ++ return (PqRecvPointer < PqRecvLength); ++} + + /* -------------------------------- + * pq_startmsgread - begin reading a message from the client. +diff --git a/src/backend/postmaster/postmaster.c b/src/backend/postmaster/postmaster.c +index 5775fc0..1fcc3f8 100644 +--- a/src/backend/postmaster/postmaster.c ++++ b/src/backend/postmaster/postmaster.c +@@ -2049,6 +2049,17 @@ retry1: + return STATUS_ERROR; + #endif + ++ /* ++ * At this point we should have no data already buffered. If we do, ++ * it was received before we performed the SSL handshake, so it wasn't ++ * encrypted and indeed may have been injected by a man-in-the-middle. ++ * We report this case to the client. ++ */ ++ if (pq_buffer_has_data()) ++ ereport(FATAL, ++ (errcode(ERRCODE_PROTOCOL_VIOLATION), ++ errmsg("received unencrypted data after SSL request"), ++ errdetail("This could be either a client-software bug or evidence of an attempted man-in-the-middle attack."))); + /* + * regular startup packet, cancel, etc packet should follow, but not + * another SSL negotiation request, and a GSS request should only +@@ -2080,7 +2091,17 @@ retry1: + if (GSSok == 'G' && secure_open_gssapi(port) == -1) + return STATUS_ERROR; + #endif +- ++ /* ++ * At this point we should have no data already buffered. If we do, ++ * it was received before we performed the GSS handshake, so it wasn't ++ * encrypted and indeed may have been injected by a man-in-the-middle. ++ * We report this case to the client. ++ */ ++ if (pq_buffer_has_data()) ++ ereport(FATAL, ++ (errcode(ERRCODE_PROTOCOL_VIOLATION), ++ errmsg("received unencrypted data after GSSAPI encryption request"), ++ errdetail("This could be either a client-software bug or evidence of an attempted man-in-the-middle attack."))); + /* + * regular startup packet, cancel, etc packet should follow, but not + * another GSS negotiation request, and an SSL request should only +diff --git a/src/include/libpq/libpq.h b/src/include/libpq/libpq.h +index b115247..9969692 100644 +--- a/src/include/libpq/libpq.h ++++ b/src/include/libpq/libpq.h +@@ -73,6 +73,7 @@ extern int pq_getbyte(void); + extern int pq_peekbyte(void); + extern int pq_getbyte_if_available(unsigned char *c); + extern int pq_putbytes(const char *s, size_t len); ++extern bool pq_buffer_has_data(void); + + /* + * prototypes for functions in be-secure.c +-- +2.17.1 + diff --git a/meta-oe/recipes-dbs/postgresql/files/CVE-2021-23222.patch b/meta-oe/recipes-dbs/postgresql/files/CVE-2021-23222.patch new file mode 100644 index 0000000000..42b78539b4 --- /dev/null +++ b/meta-oe/recipes-dbs/postgresql/files/CVE-2021-23222.patch @@ -0,0 +1,131 @@ +From 79125ead2a6a234086844bb42f06d49603fe6ca0 Mon Sep 17 00:00:00 2001 +From: Tom Lane +Date: Mon, 8 Nov 2021 11:14:56 -0500 +Subject: [PATCH 1/2] libpq: reject extraneous data after SSL or GSS encryption + handshake. + +libpq collects up to a bufferload of data whenever it reads data from +the socket. When SSL or GSS encryption is requested during startup, +any additional data received with the server's yes-or-no reply +remained in the buffer, and would be treated as already-decrypted data +once the encryption handshake completed. Thus, a man-in-the-middle +with the ability to inject data into the TCP connection could stuff +some cleartext data into the start of a supposedly encryption-protected +database session. + +This could probably be abused to inject faked responses to the +client's first few queries, although other details of libpq's behavior +make that harder than it sounds. A different line of attack is to +exfiltrate the client's password, or other sensitive data that might +be sent early in the session. That has been shown to be possible with +a server vulnerable to CVE-2021-23214. + +To fix, throw a protocol-violation error if the internal buffer +is not empty after the encryption handshake. + +Our thanks to Jacob Champion for reporting this problem. + +Security: CVE-2021-23222 + +Upstream-Status: Backport[https://github.com/postgres/postgres/commit/160c0258802d10b0600d7671b1bbea55d8e17d45] +CVE: CVE-2021-23222 + +Signed-off-by: Changqing Li +--- + doc/src/sgml/protocol.sgml | 28 ++++++++++++++++++++++++++++ + src/interfaces/libpq/fe-connect.c | 26 ++++++++++++++++++++++++++ + 2 files changed, 54 insertions(+) + +diff --git a/doc/src/sgml/protocol.sgml b/doc/src/sgml/protocol.sgml +index e26619e1b5..b692648fca 100644 +--- a/doc/src/sgml/protocol.sgml ++++ b/doc/src/sgml/protocol.sgml +@@ -1471,6 +1471,20 @@ SELCT 1/0; + and proceed without requesting SSL. + + ++ ++ When SSL encryption can be performed, the server ++ is expected to send only the single S byte and then ++ wait for the frontend to initiate an SSL handshake. ++ If additional bytes are available to read at this point, it likely ++ means that a man-in-the-middle is attempting to perform a ++ buffer-stuffing attack ++ (CVE-2021-23222). ++ Frontends should be coded either to read exactly one byte from the ++ socket before turning the socket over to their SSL library, or to ++ treat it as a protocol violation if they find they have read additional ++ bytes. ++ ++ + + An initial SSLRequest can also be used in a connection that is being + opened to send a CancelRequest message. +@@ -1532,6 +1546,20 @@ SELCT 1/0; + encryption. + + ++ ++ When GSSAPI encryption can be performed, the server ++ is expected to send only the single G byte and then ++ wait for the frontend to initiate a GSSAPI handshake. ++ If additional bytes are available to read at this point, it likely ++ means that a man-in-the-middle is attempting to perform a ++ buffer-stuffing attack ++ (CVE-2021-23222). ++ Frontends should be coded either to read exactly one byte from the ++ socket before turning the socket over to their GSSAPI library, or to ++ treat it as a protocol violation if they find they have read additional ++ bytes. ++ ++ + + An initial GSSENCRequest can also be used in a connection that is being + opened to send a CancelRequest message. +diff --git a/src/interfaces/libpq/fe-connect.c b/src/interfaces/libpq/fe-connect.c +index f80f4e98d8..57aee95183 100644 +--- a/src/interfaces/libpq/fe-connect.c ++++ b/src/interfaces/libpq/fe-connect.c +@@ -3076,6 +3076,19 @@ keep_going: /* We will come back to here until there is + pollres = pqsecure_open_client(conn); + if (pollres == PGRES_POLLING_OK) + { ++ /* ++ * At this point we should have no data already buffered. ++ * If we do, it was received before we performed the SSL ++ * handshake, so it wasn't encrypted and indeed may have ++ * been injected by a man-in-the-middle. ++ */ ++ if (conn->inCursor != conn->inEnd) ++ { ++ appendPQExpBufferStr(&conn->errorMessage, ++ libpq_gettext("received unencrypted data after SSL response\n")); ++ goto error_return; ++ } ++ + /* SSL handshake done, ready to send startup packet */ + conn->status = CONNECTION_MADE; + return PGRES_POLLING_WRITING; +@@ -3175,6 +3188,19 @@ keep_going: /* We will come back to here until there is + pollres = pqsecure_open_gss(conn); + if (pollres == PGRES_POLLING_OK) + { ++ /* ++ * At this point we should have no data already buffered. ++ * If we do, it was received before we performed the GSS ++ * handshake, so it wasn't encrypted and indeed may have ++ * been injected by a man-in-the-middle. ++ */ ++ if (conn->inCursor != conn->inEnd) ++ { ++ appendPQExpBufferStr(&conn->errorMessage, ++ libpq_gettext("received unencrypted data after GSSAPI encryption response\n")); ++ goto error_return; ++ } ++ + /* All set for startup packet */ + conn->status = CONNECTION_MADE; + return PGRES_POLLING_WRITING; +-- +2.17.1 + diff --git a/meta-oe/recipes-dbs/postgresql/postgresql_13.4.bb b/meta-oe/recipes-dbs/postgresql/postgresql_13.4.bb index f63d23dbef..2ed0fa49bb 100644 --- a/meta-oe/recipes-dbs/postgresql/postgresql_13.4.bb +++ b/meta-oe/recipes-dbs/postgresql/postgresql_13.4.bb @@ -7,6 +7,8 @@ SRC_URI += "\ file://0001-Add-support-for-RISC-V.patch \ file://0001-Improve-reproducibility.patch \ file://0001-configure.in-bypass-autoconf-2.69-version-check.patch \ + file://CVE-2021-23214.patch \ + file://CVE-2021-23222.patch \ " SRC_URI[sha256sum] = "ea93e10390245f1ce461a54eb5f99a48d8cabd3a08ce4d652ec2169a357bc0cd" From patchwork Thu Dec 30 21:31:19 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 1934 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A7A99C433EF for ; Thu, 30 Dec 2021 21:31:30 +0000 (UTC) Received: from mail-pf1-f180.google.com (mail-pf1-f180.google.com [209.85.210.180]) by mx.groups.io with SMTP id smtpd.web12.3805.1640899889705534202 for ; Thu, 30 Dec 2021 13:31:29 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=AIqoReAZ; spf=pass (domain: gmail.com, ip: 209.85.210.180, mailfrom: akuster808@gmail.com) Received: by mail-pf1-f180.google.com with SMTP id m1so22270661pfk.8 for ; Thu, 30 Dec 2021 13:31:29 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=5e970nFKNI2LtRj0CfvZL0qwIj770z5txzWYI6Kbgks=; b=AIqoReAZ3VRBrn1fp6T5cs4rq3kCBfbZ4rlJVR0bMZPrDENNAyQVDfYD1V+1S/i0nO c86iaFi36eG9/cb77EbI0HaF+KCXk+iDNbrqPPIwF75DyOLl6G45uv1xxDBH0rvxs2Fs 37m0Ynk0C6ssl7R6BIH7d1WJDLBR3YAYfiMIRD6SVAiQ5zIfx59GMnc3f4fr0ct/Ts8T PX9C5tNJboenB1RQVuzxXvzV1C0fSNFsaN7fNjhkdklMcDRiu2wjYILYiiDRpQ4jt3Kw bd6AuhM1sDuL7nTDC3xn1eW+GPZcbr5/TBfipKievM7gq5JGCHHRdvZQhHqPrn2d4ylT DfnQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=5e970nFKNI2LtRj0CfvZL0qwIj770z5txzWYI6Kbgks=; b=fTOjamb1+XvyYYxyWlB53lfZFMIpEjYivLpwyMPQJit8jQ6BLatU4Bk8NSUlwrg4H5 yWYnBps7MrhghKTSTYomZ3Mb/pt/KBrKGm2Cb1xgbt3YaWafkRoR/ux9gOqshteRN37Q 9RlVACYwDhyFrYE56MTv2W63lZed8u6298LLIXYqdyKfZxlUP2cF0qvG6BR1x1g6gckd +za+w2n7Xn8FiBag2J4G/49iIgvpQyFam90cKj0RUpJGhJUhPe4dxfsVepT4aSxBiP1W VMISIUoMv/kFNe2crUVq5DeFyn+BNfJPUdbWlp4TqXRDtIZLKSHNASOgO7dHm7RhPW3H zEXw== X-Gm-Message-State: AOAM531T8vpAA477UxyLre/Nvc72IV0IV1Q7g29qTuxaRM1W3bUWa8j2 Q3kiH/JPvgkHa31Yd+N8hnJBtflCb2I= X-Google-Smtp-Source: ABdhPJxJgCNmrZA7eALWro2HcG6eG0YVM+LDkDcUebi56HJhds8kETfbKY2zVItuvESRTST8S8XQaQ== X-Received: by 2002:a63:3f01:: with SMTP id m1mr7176231pga.446.1640899889010; Thu, 30 Dec 2021 13:31:29 -0800 (PST) Received: from keaua.caveonetworks.com ([2601:202:4180:a5c0:a625:8af4:d190:e823]) by smtp.gmail.com with ESMTPSA id t27sm9348384pgm.52.2021.12.30.13.31.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Dec 2021 13:31:28 -0800 (PST) From: Armin Kuster To: openembedded-devel@lists.openembedded.org Subject: [Honister 3/7] openvpn: upgrade 2.5.4 -> 2.5.5 Date: Thu, 30 Dec 2021 13:31:19 -0800 Message-Id: <678f72c3d3a8e79b8b829cab21283e005f6d0ed5.1640899794.git.akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Dec 2021 21:31:30 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/94572 From: zhengruoqin Changelog: ========= Fix error in example firewall.sh script configure: remove useless -Wno-* from default CFLAGS Add argv_insert_head__empty_argv__head_only to argv tests Move deprecation of SWEET32/64bit block size ciphers to 2.7 Include --push-remove in the output of --help. Move '--push-peer-info' documentation from 'server' to 'client options' add test case(s) to notice 'openvpn --show-cipher' crashing BUILD: enable CFG and Spectre mitigation for MSVC Fix loading PKCS12 files on Windows msvc: fix product version display msvc: add missing header to project file config-msvc.h: fix OpenSSL-related defines contrib/vcpkg-ports: remove openssl port GitHub Actions: use latest working lukka/run-vcpkg Use network address for emulated DHCP server as a default Load OpenSSL config on Windows from trusted location ring_buffer.h: fix GCC warning about unused function ssh_openssl.h: remove unused declaration vcpkg/pkcs11-helper: compatibility with latest vcpkg config-msvc.h: indicate key material export support Don't use BF-CBC in unit tests if we don't have it Define have_blowfish variable in ncp unit tests doc link-options.rst: Use free open-source dynamic-DNS provider URL Fix some more wrong defines in config-msvc.h Ensure the current common_name is in the environment for scripts Require EC key support in Windows builds resolvconf fails with -p Update IRC information in CONTRIBUTING.rst doc/man (vpn-network-options): fix foreign_option_{n} typo README.down-root: Fix plugin module name Signed-off-by: Zheng Ruoqin Signed-off-by: Khem Raj (cherry picked from commit 2867330535cd93067d1fc005f0cdf5984a4c43fb) [2.5.x is a stable branch] Signed-off-by: Armin Kuster --- .../openvpn/{openvpn_2.5.4.bb => openvpn_2.5.5.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-networking/recipes-support/openvpn/{openvpn_2.5.4.bb => openvpn_2.5.5.bb} (97%) diff --git a/meta-networking/recipes-support/openvpn/openvpn_2.5.4.bb b/meta-networking/recipes-support/openvpn/openvpn_2.5.5.bb similarity index 97% rename from meta-networking/recipes-support/openvpn/openvpn_2.5.4.bb rename to meta-networking/recipes-support/openvpn/openvpn_2.5.5.bb index 6b588a5f50..2dc3af6bf9 100644 --- a/meta-networking/recipes-support/openvpn/openvpn_2.5.4.bb +++ b/meta-networking/recipes-support/openvpn/openvpn_2.5.5.bb @@ -14,7 +14,7 @@ SRC_URI = "http://swupdate.openvpn.org/community/releases/${BP}.tar.gz \ UPSTREAM_CHECK_URI = "https://openvpn.net/community-downloads" -SRC_URI[sha256sum] = "f80f3c3df1b94a8892ae547df84f152583250684a24bd022ccc98ef56fa93d97" +SRC_URI[sha256sum] = "7500df4734173bce2e95b5039079119dacaff121650b2b6ca76d2dc68bdac1c5" # CVE-2020-7224 and CVE-2020-27569 are for Aviatrix OpenVPN client, not for openvpn. CVE_CHECK_WHITELIST += "CVE-2020-7224 CVE-2020-27569" From patchwork Thu Dec 30 21:31:20 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 1935 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B062BC433FE for ; Thu, 30 Dec 2021 21:31:31 +0000 (UTC) Received: from mail-pj1-f51.google.com (mail-pj1-f51.google.com [209.85.216.51]) by mx.groups.io with SMTP id smtpd.web11.3795.1640899890423697733 for ; Thu, 30 Dec 2021 13:31:30 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=VB82awGC; spf=pass (domain: gmail.com, ip: 209.85.216.51, mailfrom: akuster808@gmail.com) Received: by mail-pj1-f51.google.com with SMTP id gj24so22136478pjb.0 for ; Thu, 30 Dec 2021 13:31:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=wEhkkbL3USYDUq/kZjSeUPxfg1PFc3qU6gm01t2lPLk=; b=VB82awGCvncwgBBUr14erW/AmKOhBEXOSF50ud/CQ/ee+5g5eKQWpWik3X7bGQo234 m4WuQMjANtc6Ar5FRrVEXmbmpxO7xu4JKSIeR6OzrvggpcYBex4x1IvleikY4a9UY0ie Z0i+brT+Nqh4FYY8M9Br7sPxHG8ji6jEj5QeyTtpHKLTk4RIiJ215sAwPi/V1bZKrhIw up5WggQtIOmZVj7xcD2cpdnexCwcVAFNixHGPyZMc9OfQsN8umEhciqWeSX+OKrV9LJt CPuUxwm+o+hIeGXVy/uymYFFvc89EHMMRdWwkWwi1vgC9X8VowDKBj2WqWSCIvqtmUiw v9Ig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=wEhkkbL3USYDUq/kZjSeUPxfg1PFc3qU6gm01t2lPLk=; b=n2Cj/R4FzJaQmgGJi7qb+iMB0PhEsWGF71m8wIJcf/RFp8i7LNDjWB6Jy6fTRv21DD T3oD0AwTjOmzRDdDlaqLtOpMI68S/euc9aDOwn2sDpNGD9kQ9FE8982Rh/WLpMLi+Qg2 MaeBdS8AmMvA2aYWfzfx0xl5mBAVFW4Fb/45oEb+oHR8Ra0bH23k4SJq6DoIthtzVLFC fg+iRJO1A2+0vj4eiyKDUpJbwbPusYrMwIIsD0b1W0+3lamukZxRCJCKm6u5akx+pyrV 13g10uoDjC8uVT0AGVS5DEKtnzcyE8KrU2pA7d/SEUMKoedndPa2aH2IuUe/BPxEbuIX 3twg== X-Gm-Message-State: AOAM5302xJM9RdiREA6JSZlRRr5fKbi3IT96FJS3NRJHnwPrl1KPG+Uf KqXLFc7wpEuLLe77c4CNA6VanINmn6Y= X-Google-Smtp-Source: ABdhPJzwMiYKLiTKgh/E1ET7lFxDaIN4TW/Jx6rXXR4GKL3qj7m4yvqWL4xexFC2/wtikYimqAwQzg== X-Received: by 2002:a17:90a:c506:: with SMTP id k6mr40329046pjt.74.1640899889737; Thu, 30 Dec 2021 13:31:29 -0800 (PST) Received: from keaua.caveonetworks.com ([2601:202:4180:a5c0:a625:8af4:d190:e823]) by smtp.gmail.com with ESMTPSA id t27sm9348384pgm.52.2021.12.30.13.31.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Dec 2021 13:31:29 -0800 (PST) From: Armin Kuster To: openembedded-devel@lists.openembedded.org Subject: [Honister 4/7] postfix: upgrade 3.6.2 -> 3.6.3 Date: Thu, 30 Dec 2021 13:31:20 -0800 Message-Id: <550ea1cab266a9a08e28415529af1eed2d78c501.1640899794.git.akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Dec 2021 21:31:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/94573 From: Yi Zhao Release Notes: http://www.postfix.org/announcements/postfix-3.6.3.html Signed-off-by: Yi Zhao Signed-off-by: Khem Raj (cherry picked from commit 45fee2d0cec121808c6dda150b0d9ab990c74a72) [3.6.x is a stable release] Signed-off-by: Armin Kuster --- .../postfix/{postfix_3.6.2.bb => postfix_3.6.3.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-networking/recipes-daemons/postfix/{postfix_3.6.2.bb => postfix_3.6.3.bb} (89%) diff --git a/meta-networking/recipes-daemons/postfix/postfix_3.6.2.bb b/meta-networking/recipes-daemons/postfix/postfix_3.6.3.bb similarity index 89% rename from meta-networking/recipes-daemons/postfix/postfix_3.6.2.bb rename to meta-networking/recipes-daemons/postfix/postfix_3.6.3.bb index 982544d5ca..98005797d9 100644 --- a/meta-networking/recipes-daemons/postfix/postfix_3.6.2.bb +++ b/meta-networking/recipes-daemons/postfix/postfix_3.6.3.bb @@ -15,5 +15,5 @@ SRC_URI += "ftp://ftp.porcupine.org/mirrors/postfix-release/official/postfix-${P file://0001-makedefs-add-lnsl-and-lresolv-to-SYSLIBS-by-default.patch \ file://0007-correct-signature-of-closefrom-API.patch \ " -SRC_URI[sha256sum] = "507323d20d7b3f705f49cf8c07d437c6d8090bed07e15a3c0ec405edad54a7d4" +SRC_URI[sha256sum] = "0f1241d456a0158e0c418abf62c52c2ff83f8f1dcf2fbdd4c40765b67789b1bc" UPSTREAM_CHECK_REGEX = "postfix\-(?P3\.6(\.\d+)+).tar.gz" From patchwork Thu Dec 30 21:31:21 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 1937 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B1106C43217 for ; Thu, 30 Dec 2021 21:31:31 +0000 (UTC) Received: from mail-pj1-f43.google.com (mail-pj1-f43.google.com [209.85.216.43]) by mx.groups.io with SMTP id smtpd.web09.3771.1640899891082629713 for ; Thu, 30 Dec 2021 13:31:31 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=ITAOY6n9; spf=pass (domain: gmail.com, ip: 209.85.216.43, mailfrom: akuster808@gmail.com) Received: by mail-pj1-f43.google.com with SMTP id c9-20020a17090a1d0900b001b2b54bd6c5so7377129pjd.1 for ; Thu, 30 Dec 2021 13:31:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=04cI5KXpvUEcN0AMLFUa6XHEc2GQh06PPONG3Y72DkM=; b=ITAOY6n9Ptgj8Jhb9HIxMEfOYNQgfZfxJSDpNDf8vEBZInHEMi27UtEzBg4NC332uG uXK5nFTFT7Klva7iS/zjLe5++mw0CIQD5DeF9d6K21UN+6NqgsPcBe97wSh5JsF2N6NJ errVYbaPuzy2NeJvlUK3l7K5FquGGDvsmcH1kNIMFqgeuTvGGnlqwXDHe/IjTYyiYpoW LqeeT5GG9wBHzzPl0ctHiE/2Woij6XFPWoknrAkiuZBRvdOUsc7N6FgDihN+Dax95cAO MvhA2vrdOSZcG6+Bg3UOxC2WxXnTCSFcbR877DrAFgHfUvT8Oj49GpHTroZbZoUQOZEg 40WA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=04cI5KXpvUEcN0AMLFUa6XHEc2GQh06PPONG3Y72DkM=; b=gPXNvpMf3SWINh3Z2oZtRrMuNlgfdkojHZ85IiOgsFhF1jPERP98u1idH+080CPC7n Pu0Jx06Djk7dbEV41jz9C8mE2j8eYCZRVaPSRCXfpT6/RGjXYChsn0vWYJLa9WkZQJHx goLW9fAUQ1KcBhVgVvj/eJcCRQQJ7Bk7pp9GOq4l6j5yCuUscXXbBlyoIqz8dnh1w5fv ISjpG7A6ZITHeKHZZMf8lDTsVnlCwxFTxIznDGhUmerNvcj/rN+DP/z7MEBzr7wyCxh/ Ozopx/OEWzP4b7PBDGP55/v7hvZ4x+Qtml03kZ9GUO/zGnpsr7rsnWV+LW4N2e0z4n+I PRwQ== X-Gm-Message-State: AOAM5329FFLIRKkWzRPVkFjU1KRNsV5phevCqxx7TF1dI6t8uRAFRWJL Q0824ML3D/6vtR8IwW51Ebhzv3lABRw= X-Google-Smtp-Source: ABdhPJzkZV6gOHY1bwWbULe01iD8MqnYbqq21n2XyenyrcmPJ+c+Flo+5aeFrGhpt/urZ2M224WjnA== X-Received: by 2002:a17:902:c652:b0:148:f1ea:a2ca with SMTP id s18-20020a170902c65200b00148f1eaa2camr32421337pls.125.1640899890520; Thu, 30 Dec 2021 13:31:30 -0800 (PST) Received: from keaua.caveonetworks.com ([2601:202:4180:a5c0:a625:8af4:d190:e823]) by smtp.gmail.com with ESMTPSA id t27sm9348384pgm.52.2021.12.30.13.31.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Dec 2021 13:31:30 -0800 (PST) From: Armin Kuster To: openembedded-devel@lists.openembedded.org Subject: [Honister 5/7] openipmi: upgrade 2.0.31 -> 2.0.32 Date: Thu, 30 Dec 2021 13:31:21 -0800 Message-Id: <7fc335961a90825e3124d18461bd608052cd1c74.1640899794.git.akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Dec 2021 21:31:31 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/94574 From: Yi Zhao Signed-off-by: Yi Zhao Signed-off-by: Khem Raj (cherry picked from commit 35aa5959c6bc2fa0458b90f4892cffd1da8189f0) Signed-off-by: Armin Kuster --- .../openipmi/{openipmi_2.0.31.bb => openipmi_2.0.32.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta-networking/recipes-support/openipmi/{openipmi_2.0.31.bb => openipmi_2.0.32.bb} (96%) diff --git a/meta-networking/recipes-support/openipmi/openipmi_2.0.31.bb b/meta-networking/recipes-support/openipmi/openipmi_2.0.32.bb similarity index 96% rename from meta-networking/recipes-support/openipmi/openipmi_2.0.31.bb rename to meta-networking/recipes-support/openipmi/openipmi_2.0.32.bb index ecc98dd8be..0b4244022e 100644 --- a/meta-networking/recipes-support/openipmi/openipmi_2.0.31.bb +++ b/meta-networking/recipes-support/openipmi/openipmi_2.0.32.bb @@ -35,8 +35,8 @@ SRC_URI = "${SOURCEFORGE_MIRROR}/openipmi/OpenIPMI-${PV}.tar.gz \ S = "${WORKDIR}/OpenIPMI-${PV}" -SRC_URI[md5sum] = "ce8eb27da016dcad7543d0128fcb3b0a" -SRC_URI[sha256sum] = "7052f37726ff454b0dcac49f35dd030bc12c9570ca0ba5cd2d17774b8e9d9717" +SRC_URI[md5sum] = "532404c9df7d0e8bde975b95b9e6775b" +SRC_URI[sha256sum] = "f6d0fd4c0a74b05f80907229d0b270f54ca23294bcc11979f8b8d12766786945" inherit autotools-brokensep pkgconfig python3native perlnative update-rc.d systemd cpan-base python3targetconfig From patchwork Thu Dec 30 21:31:22 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 1936 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AA713C433F5 for ; Thu, 30 Dec 2021 21:31:32 +0000 (UTC) Received: from mail-pl1-f169.google.com (mail-pl1-f169.google.com [209.85.214.169]) by mx.groups.io with SMTP id smtpd.web09.3772.1640899891802658380 for ; Thu, 30 Dec 2021 13:31:31 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=chnDvFwD; spf=pass (domain: gmail.com, ip: 209.85.214.169, mailfrom: akuster808@gmail.com) Received: by mail-pl1-f169.google.com with SMTP id w7so18485045plp.13 for ; Thu, 30 Dec 2021 13:31:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=r4TDkjphn65KDG9daSCxgxBAjmckdsx/aKReychB4wo=; b=chnDvFwDR1yqDa9l7jTxP2fCekFUSWLsWXf5KIsO1NWqPvQ3sOJKbVDBVCq9OPx48c /v3QhVfg9ol4rFpUvAcDdnDhklUHIog9CZiGMgeBn8U4rhxCGHdS1SkLwE2wjEa82kal qzeny2RcTrFOLFDjWJpCVZ9T4uytfp90npAfvs6D4afN+tnsmWd1DyvuDpwHpC1idmi3 heEExjewo4x6go4RZPzGWEGHS8emrs7+aN2HlfaaTKZs3n96J1fZ+Rfy92jXQsCbbOPY mwUkitWoqdQThhhs4/94BC3yxfjkpx5YNuW3zo31SBe62tP3aRHwPC5c+6jXYgXPL+Q4 GQlA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=r4TDkjphn65KDG9daSCxgxBAjmckdsx/aKReychB4wo=; b=ubTELMwOZVG77OGyY2xhJVHjKSjOvuvfn9R14gBqi/DyjC0SpFR1H+Ut6eHK8Pz3LF yUOg23kN7qdHNOYthd9z7oF63O2p8/PwP4erfOrArSgnZyVb9poJZdcUS2HGUaXsbkHz eXYutDw1Xz1Cnz/UvLv4jvYARB2TUna5ZneiGMyYEs8hriJIL0500QwXDDaPi6lkVa+H E3Oi7sAmiIgx+Pba3/BKtSzKwItto/6aGEmrDu4Tl1zNWgT3szUco/ImKF8L3PB89ivO ASRYi1Yya3KW0n9B1buPpx2aobl3Lxzf9fj7B/JKApMgxtybnPo7x45iSnWhjdSN1J6M Jo9A== X-Gm-Message-State: AOAM5324SVaDpt8xjNYjotUAfcr2I3oz4oWsTWrx55SRD/64mItQRfUG eXualk7VQY1tV+fI0QUokELx+kl6cGc= X-Google-Smtp-Source: ABdhPJyjQ5aMweLz8FkIAlCZjLCOnqpK42hoi1j3Mp5xBGUqoR0xl2lP/g0VaFyNSpNfzS0ycq7XBg== X-Received: by 2002:a17:90b:4d8e:: with SMTP id oj14mr39828349pjb.121.1640899891276; Thu, 30 Dec 2021 13:31:31 -0800 (PST) Received: from keaua.caveonetworks.com ([2601:202:4180:a5c0:a625:8af4:d190:e823]) by smtp.gmail.com with ESMTPSA id t27sm9348384pgm.52.2021.12.30.13.31.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Dec 2021 13:31:30 -0800 (PST) From: Armin Kuster To: openembedded-devel@lists.openembedded.org Subject: [Honister 6/7] libfile-slurper-perl: upgrade 0.012 -> 0.013 Date: Thu, 30 Dec 2021 13:31:22 -0800 Message-Id: <6fc97431a9d77168e83450595632f5dbe324532b.1640899794.git.akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Dec 2021 21:31:32 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/94575 From: wangmy Changelog: ========= Always split on newlines in read_lines Signed-off-by: Wang Mingyu Signed-off-by: Khem Raj (cherry picked from commit d830b7ad4a957a4667d000f840d9442db13250d2) Signed-off-by: Armin Kuster --- ...ile-slurper-perl_0.012.bb => libfile-slurper-perl_0.013.bb} | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) rename meta-perl/recipes-perl/libfile/{libfile-slurper-perl_0.012.bb => libfile-slurper-perl_0.013.bb} (88%) diff --git a/meta-perl/recipes-perl/libfile/libfile-slurper-perl_0.012.bb b/meta-perl/recipes-perl/libfile/libfile-slurper-perl_0.013.bb similarity index 88% rename from meta-perl/recipes-perl/libfile/libfile-slurper-perl_0.012.bb rename to meta-perl/recipes-perl/libfile/libfile-slurper-perl_0.013.bb index 4a2cb73e86..c7e5c56b6e 100644 --- a/meta-perl/recipes-perl/libfile/libfile-slurper-perl_0.012.bb +++ b/meta-perl/recipes-perl/libfile/libfile-slurper-perl_0.013.bb @@ -13,8 +13,7 @@ file://${COMMON_LICENSE_DIR}/GPL-1.0-or-later;md5=30c0b8a5048cc2f4be5ff15ef0d8cf SRC_URI = "${CPAN_MIRROR}/authors/id/L/LE/LEONT/File-Slurper-${PV}.tar.gz" -SRC_URI[md5sum] = "5742c63096392dfee50b8db314bcca18" -SRC_URI[sha256sum] = "4efb2ea416b110a1bda6f8133549cc6ea3676402e3caf7529fce0313250aa578" +SRC_URI[sha256sum] = "e2f6a4029a6a242d50054044f1fb86770b9b5cc4daeb1a967f91ffb42716a8c5" RDEPENDS:${PN} = " \ perl-module-carp \ perl-module-encode \ From patchwork Thu Dec 30 21:31:23 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 1938 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A9F92C433EF for ; Thu, 30 Dec 2021 21:31:33 +0000 (UTC) Received: from mail-pl1-f170.google.com (mail-pl1-f170.google.com [209.85.214.170]) by mx.groups.io with SMTP id smtpd.web12.3806.1640899892857862776 for ; Thu, 30 Dec 2021 13:31:32 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=MOwEUo7N; spf=pass (domain: gmail.com, ip: 209.85.214.170, mailfrom: akuster808@gmail.com) Received: by mail-pl1-f170.google.com with SMTP id w24so19008129ply.12 for ; Thu, 30 Dec 2021 13:31:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=zj6RUUQxF3hb2+FdEKgSc1JN3oh2pyLNhXyGuX5ElEU=; b=MOwEUo7NMEtEw6x26v1DKrr1Cs0wB3F7FehTLO7LQDqBMcV9T0PV7JDeArQscn/JFg rbS7Zw/2yh8RN7tjBDozJR21e8JMyHGlhajjAuR0/nvxr5IGq200TcSSpfuxsrD5WBxA vFfkR+21uOGilLSK/YFt0221YU8Iz0ByHrAJh5kCNRr1/Q0wkJ33u0l5lMlG3ZyCQRwq HnFZFfGd5SBeYVxLorVcNYGVPp9oZn31qk5ImUhmK0TtPLFslKS4L6rais1UPXLY74VD IyuzRDWBka7N6+hHbBDqoz64ZFt6OKyKMS6caVSZoYg/O7cOonj2oUKISEFqa627JzYe 65Sg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=zj6RUUQxF3hb2+FdEKgSc1JN3oh2pyLNhXyGuX5ElEU=; b=tUABZDlDDKG4dsFKDU99mwoD+xCZGtDnmqOR8/s4LJ3KZ0jv4QR9bn/oN+bdNWviQS CV9MrJSzIehYhFhDzUQvczyZ5I8+6F4wfETSJARBtOTdn1YuU/9pQkJ/WYMf8rFMxigx fa+1eb/5X4LlvBi0Of5xpRoA4IXdo4p0uFYP9Rz0hxj1wQ6OPpO2BbCL6BrKVIrM/hF9 LSqddbfUyfYJQg+USo4IaSI3OHzAD7Cggvd4/hweyBwI94J2IhnWnJ8kE0uMnLxHhNDT i3VSlI3EhT91MyCneyh4zAJ9Stqsb0nTtQrNdQ+3iFkHfJ5EouC1prr81NNFyVDbBZU2 nEcQ== X-Gm-Message-State: AOAM532ZIWdwGQXpMJFJyCvLUo2LSFSCezn54sZeoCCWeGgTJwPKj7PG JMAzZYSsMmqOBsXCHdh461yKmTYeK1s= X-Google-Smtp-Source: ABdhPJyKkwiYHbw+qifw6/QdCb6Za6CYwtuGmrWrTfNqi7RcbGtfwpL6M4I2JWom3byEXpSt8zbSbg== X-Received: by 2002:a17:902:c947:b0:149:92d:fc44 with SMTP id i7-20020a170902c94700b00149092dfc44mr32599536pla.139.1640899892051; Thu, 30 Dec 2021 13:31:32 -0800 (PST) Received: from keaua.caveonetworks.com ([2601:202:4180:a5c0:a625:8af4:d190:e823]) by smtp.gmail.com with ESMTPSA id t27sm9348384pgm.52.2021.12.30.13.31.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Dec 2021 13:31:31 -0800 (PST) From: Armin Kuster To: openembedded-devel@lists.openembedded.org Subject: [Honister 7/7] libnet-dns-perl: upgrade 1.32 -> 1.33 Date: Thu, 30 Dec 2021 13:31:23 -0800 Message-Id: <55cd5fa4cafe974e4e4ed28b2827530693947b1b.1640899794.git.akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 30 Dec 2021 21:31:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/94576 From: zhengruoqin License-Update: change "the above copyright" to "the original copyright" Changelog: ========= Fix rt.cpan.org #137768 Test t/05-SVCB.t on Perl 5.18.0 fails with deep recursion. Signed-off-by: Zheng Ruoqin Signed-off-by: Khem Raj (cherry picked from commit 347a9d7456fbc705c58113adf397025a0cd12e24) Signed-off-by: Armin Kuster --- .../{libnet-dns-perl_1.32.bb => libnet-dns-perl_1.33.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta-perl/recipes-perl/libnet/{libnet-dns-perl_1.32.bb => libnet-dns-perl_1.33.bb} (93%) diff --git a/meta-perl/recipes-perl/libnet/libnet-dns-perl_1.32.bb b/meta-perl/recipes-perl/libnet/libnet-dns-perl_1.33.bb similarity index 93% rename from meta-perl/recipes-perl/libnet/libnet-dns-perl_1.32.bb rename to meta-perl/recipes-perl/libnet/libnet-dns-perl_1.33.bb index 7e485bece5..2c7d793a7b 100644 --- a/meta-perl/recipes-perl/libnet/libnet-dns-perl_1.32.bb +++ b/meta-perl/recipes-perl/libnet/libnet-dns-perl_1.33.bb @@ -3,13 +3,13 @@ HOMEPAGE = "http://www.net-dns.org/" SECTION = "libs" LICENSE = "MIT" -LIC_FILES_CHKSUM = "file://README;beginline=252;endline=269;md5=27db37b42cd1a5173a53922d67072bcb" +LIC_FILES_CHKSUM = "file://README;beginline=252;endline=269;md5=de95b6a896d5f861d724ea854d316a0b" DEPENDS += "perl" SRC_URI = "http://search.cpan.org/CPAN/authors/id/N/NL/NLNETLABS/Net-DNS-${PV}.tar.gz" -SRC_URI[sha256sum] = "b890a7b44d573f27cc713caadf1e12eaaa4478a6504d1157194df614316b5b50" +SRC_URI[sha256sum] = "5a40e7cf524e4bd2c33cf03b82b47d5308b712083aa5ee180b0b5af54c71fbd2" UPSTREAM_CHECK_REGEX = "Net\-DNS\-(?P(\d+\.\d+))(?!_\d+).tar"