From e84086967db6d7af9d6983cd777eff8cc510f0f9576a50aca59935680cb78c8a Mon Sep 17 00:00:00 2001 From: Dirk Mueller Date: Thu, 9 Jan 2020 08:35:09 +0000 Subject: [PATCH] Accepting request 760716 from home:pevik:branches:Base:System - Update to libtirpc 1.2.5 - A number resource leaks and other issues were fix which were identified by a Coverity Scan. - The AUTH_DES authentication has been deprecated. If any of those routines are called, they will fail immediately. - numerous bug fixes - Package changes: - Build without AUTH_DES authentication - Add patch from next release 0001-Add-authdes_seccreate-stub.patch (a86b4ff Add authdes_seccreate() stub) - Drop rc patches (libtirpc-1-1-5-rc1.patch, libtirpc-1-1-5-rc2.patch) - Drop patches all patches backported from this release (0001-Makefile.am-Use-LIBADD-instead-of-LDFLAGS-to-link-ag.patch, 0002-man-rpc_secure.3t-Fix-typo-in-manpage.patch, 0003-xdr-add-a-defensive-mask-in-xdr_int64_t-and-xdr_u_in.patch) OBS-URL: https://build.opensuse.org/request/show/760716 OBS-URL: https://build.opensuse.org/package/show/Base:System/libtirpc?expand=0&rev=81 --- 0001-Add-authdes_seccreate-stub.patch | 42 +++++ ...LIBADD-instead-of-LDFLAGS-to-link-ag.patch | 36 ---- ...an-rpc_secure.3t-Fix-typo-in-manpage.patch | 31 ---- ...ive-mask-in-xdr_int64_t-and-xdr_u_in.patch | 44 ----- libtirpc-1-1-5-rc1.patch | 170 ------------------ libtirpc-1-1-5-rc2.patch | 148 --------------- libtirpc-1.1.4.tar.bz2 | 3 - libtirpc-1.2.5.tar.bz2 | 3 + libtirpc.changes | 20 +++ libtirpc.spec | 16 +- 10 files changed, 69 insertions(+), 444 deletions(-) create mode 100644 0001-Add-authdes_seccreate-stub.patch delete mode 100644 0001-Makefile.am-Use-LIBADD-instead-of-LDFLAGS-to-link-ag.patch delete mode 100644 0002-man-rpc_secure.3t-Fix-typo-in-manpage.patch delete mode 100644 0003-xdr-add-a-defensive-mask-in-xdr_int64_t-and-xdr_u_in.patch delete mode 100644 libtirpc-1-1-5-rc1.patch delete mode 100644 libtirpc-1-1-5-rc2.patch delete mode 100644 libtirpc-1.1.4.tar.bz2 create mode 100644 libtirpc-1.2.5.tar.bz2 diff --git a/0001-Add-authdes_seccreate-stub.patch b/0001-Add-authdes_seccreate-stub.patch new file mode 100644 index 0000000..63faf90 --- /dev/null +++ b/0001-Add-authdes_seccreate-stub.patch @@ -0,0 +1,42 @@ +From a86b4ff0c4b4e53df436f83c21a5fbf01568a301 Mon Sep 17 00:00:00 2001 +From: Petr Vorel +Date: Fri, 3 Jan 2020 09:55:28 -0500 +Subject: [PATCH 1/2] Add authdes_seccreate() stub + +bf8f0b82d added back authdes_create() and authdes_pk_create() interfaces +also when authdes compiled out. Add also authdes_seccreate(). + +Found by LTP rpc-tirpc test, which fails to link: + +/usr/lib64/gcc/x86_64-suse-linux/9/../../../../x86_64-suse-linux/bin/ld: /tmp/ccFanCMm.o: in function `main': + testcases/network/rpc/rpc-tirpc/tests_pack/rpc_suite/tirpc/tirpc_auth_authdes_seccreate/tirpc_authdes_seccreate.c:55: undefined reference to `authdes_seccreate' + +Fixes: bf8f0b82d ("Add back the authdes interfaces") + +Signed-off-by: Petr Vorel +Signed-off-by: Steve Dickson +--- + src/rpc_soc.c | 7 +++++++ + 1 file changed, 7 insertions(+) + +diff --git a/src/rpc_soc.c b/src/rpc_soc.c +index ac7d312..fde121d 100644 +--- a/src/rpc_soc.c ++++ b/src/rpc_soc.c +@@ -613,6 +613,13 @@ authdes_pk_create(servername, pkey, window, syncaddr, ckey) + des_block *ckey; /* optional conversation key to use */ + { return (NULL); } + ++AUTH * ++authdes_seccreate(const char *servername, const u_int win, ++ const char *timehost, const des_block *ckey) ++{ ++ return (NULL); ++} ++ + #endif + + +-- +2.24.0 + diff --git a/0001-Makefile.am-Use-LIBADD-instead-of-LDFLAGS-to-link-ag.patch b/0001-Makefile.am-Use-LIBADD-instead-of-LDFLAGS-to-link-ag.patch deleted file mode 100644 index 3d8010f..0000000 --- a/0001-Makefile.am-Use-LIBADD-instead-of-LDFLAGS-to-link-ag.patch +++ /dev/null @@ -1,36 +0,0 @@ -From 013cc45abef8055b3ee135fc072e402611a4a3f0 Mon Sep 17 00:00:00 2001 -From: Laurent Bigonville -Date: Tue, 11 Jun 2019 11:34:16 -0400 -Subject: [PATCH 1/7] Makefile.am: Use LIBADD instead of LDFLAGS to link - against krb5 - -LDFLAGS shouldn't be used to link against libraries as this would break -positional flags like --as-needed - -Use LIBADD instead - -Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1639032 - -Signed-off-by: Steve Dickson -Signed-off-by: Petr Vorel -[Upstream status: 013cc45abef8055b3ee135fc072e402611a4a3f0] ---- - src/Makefile.am | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/Makefile.am b/src/Makefile.am -index 932414d..b40a6b4 100644 ---- a/src/Makefile.am -+++ b/src/Makefile.am -@@ -38,7 +38,7 @@ endif - if GSS - libtirpc_la_SOURCES += auth_gss.c authgss_prot.c svc_auth_gss.c \ - rpc_gss_utils.c -- libtirpc_la_LDFLAGS += $(GSSAPI_LIBS) -+ libtirpc_la_LIBADD = $(GSSAPI_LIBS) - libtirpc_la_CFLAGS = -DHAVE_RPCSEC_GSS $(GSSAPI_CFLAGS) - endif - --- -2.23.0 - diff --git a/0002-man-rpc_secure.3t-Fix-typo-in-manpage.patch b/0002-man-rpc_secure.3t-Fix-typo-in-manpage.patch deleted file mode 100644 index dfb1778..0000000 --- a/0002-man-rpc_secure.3t-Fix-typo-in-manpage.patch +++ /dev/null @@ -1,31 +0,0 @@ -From e51590d6c4ab61f1a22a2f47104053fe2966ecdd Mon Sep 17 00:00:00 2001 -From: Laurent Bigonville -Date: Tue, 11 Jun 2019 11:53:14 -0400 -Subject: [PATCH 3/7] man/rpc_secure.3t: Fix typo in manpage - -Currently the publickey parameter of the authdes_pk_create() function is -not displayed because of a typo - -Signed-off-by: Steve Dickson -Signed-off-by: Petr Vorel -[Upstream status: e51590d6c4ab61f1a22a2f47104053fe2966ecdd] ---- - man/rpc_secure.3t | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/man/rpc_secure.3t b/man/rpc_secure.3t -index 4a1ad93..404df0b 100644 ---- a/man/rpc_secure.3t -+++ b/man/rpc_secure.3t -@@ -19,7 +19,7 @@ - .Ft AUTH * - .Fo authdes_pk_create - .Fa "char *name" --.FA "netobj *publickey" -+.Fa "netobj *publickey" - .Fa "unsigned window" - .Fa "struct sockaddr *addr" - .Fa "des_block *ckey" --- -2.23.0 - diff --git a/0003-xdr-add-a-defensive-mask-in-xdr_int64_t-and-xdr_u_in.patch b/0003-xdr-add-a-defensive-mask-in-xdr_int64_t-and-xdr_u_in.patch deleted file mode 100644 index 4462fbe..0000000 --- a/0003-xdr-add-a-defensive-mask-in-xdr_int64_t-and-xdr_u_in.patch +++ /dev/null @@ -1,44 +0,0 @@ -From d1208b5de7b52172a34e3a7262e96f99830c9770 Mon Sep 17 00:00:00 2001 -From: Stefano Garzarella -Date: Tue, 3 Sep 2019 10:54:11 -0400 -Subject: [PATCH 4/7] xdr: add a defensive mask in xdr_int64_t() and - xdr_u_int64_t() - -In order to be more defensive, we should mask bits of u_int64_t -value if we want to use only the first 32bit. - -Signed-off-by: Stefano Garzarella -Signed-off-by: Steve Dickson -Signed-off-by: Petr Vorel -[Upstream status: d1208b5de7b52172a34e3a7262e96f99830c9770] ---- - src/xdr.c | 6 ++++-- - 1 file changed, 4 insertions(+), 2 deletions(-) - -diff --git a/src/xdr.c b/src/xdr.c -index b9a1558..28d1382 100644 ---- a/src/xdr.c -+++ b/src/xdr.c -@@ -877,7 +877,8 @@ xdr_int64_t(xdrs, llp) - if (XDR_GETLONG(xdrs, (long *)&ul[1]) == FALSE) - return (FALSE); - *llp = (int64_t) -- (((u_int64_t)ul[0] << 32) | ((u_int64_t)ul[1])); -+ (((u_int64_t)ul[0] << 32) | -+ ((u_int64_t)(ul[1]) & 0xffffffff)); - return (TRUE); - case XDR_FREE: - return (TRUE); -@@ -910,7 +911,8 @@ xdr_u_int64_t(xdrs, ullp) - if (XDR_GETLONG(xdrs, (long *)&ul[1]) == FALSE) - return (FALSE); - *ullp = (u_int64_t) -- (((u_int64_t)ul[0] << 32) | ((u_int64_t)ul[1])); -+ (((u_int64_t)ul[0] << 32) | -+ ((u_int64_t)(ul[1]) & 0xffffffff)); - return (TRUE); - case XDR_FREE: - return (TRUE); --- -2.23.0 - diff --git a/libtirpc-1-1-5-rc1.patch b/libtirpc-1-1-5-rc1.patch deleted file mode 100644 index 9f0add1..0000000 --- a/libtirpc-1-1-5-rc1.patch +++ /dev/null @@ -1,170 +0,0 @@ -git diff libtirpc-1-1-4..libtirpc-1-1-5-rc1 - -Commits: -e49077d clnt_vc.c: remove a false positive from a covscan -4d2ceca svc_simple.c: resource_leak -92d4b35 svc_generic.c: resource_leak -3b2e537 rtime.c: resource_leak -830e3f6 rpcb_clnt.c: resource_leak -c0885a7 rpc_soc.c: buffer_size_warning -6db7f04 rpc_soc.c: resource_leak -710a713 rpc_generic.c: resource_leak -57d1529 getnetpath.c: resource_leak -a1fae25 getnetconfig.c: cppcheck_warning -55d1460 clnt_vc.c: resource_leak -757f379 clnt_bcast.c: resource_leak -489dd50 auth_gss.c: buffer_size_warning -25fdba9 auth_gss.c: resource_leak - -Signed-off-by: Petr Vorel -diff --git a/src/auth_gss.c b/src/auth_gss.c -index 5959893..7d08262 100644 ---- a/src/auth_gss.c -+++ b/src/auth_gss.c -@@ -207,6 +207,7 @@ authgss_create(CLIENT *clnt, gss_name_t name, struct rpc_gss_sec *sec) - rpc_createerr.cf_stat = RPC_SYSTEMERROR; - rpc_createerr.cf_error.re_errno = ENOMEM; - free(auth); -+ free(gd); - return (NULL); - } - } -@@ -592,7 +593,7 @@ _rpc_gss_refresh(AUTH *auth, rpc_gss_options_ret_t *options_ret) - if (rpc_gss_oid_to_mech(actual_mech_type, &mechanism)) { - strncpy(options_ret->actual_mechanism, - mechanism, -- sizeof(options_ret->actual_mechanism)); -+ (sizeof(options_ret->actual_mechanism)-1)); - } - - gd->established = TRUE; -diff --git a/src/clnt_bcast.c b/src/clnt_bcast.c -index 98cf061..2ad6c89 100644 ---- a/src/clnt_bcast.c -+++ b/src/clnt_bcast.c -@@ -330,6 +330,7 @@ rpc_broadcast_exp(prog, vers, proc, xargs, argsp, xresults, resultsp, - if (nettype == NULL) - nettype = "datagram_n"; - if ((handle = __rpc_setconf(nettype)) == NULL) { -+ AUTH_DESTROY(sys_auth); - return (RPC_UNKNOWNPROTO); - } - while ((nconf = __rpc_getconf(handle)) != NULL) { -diff --git a/src/getnetconfig.c b/src/getnetconfig.c -index 92e7c43..d67d97d 100644 ---- a/src/getnetconfig.c -+++ b/src/getnetconfig.c -@@ -709,6 +709,8 @@ struct netconfig *ncp; - p->nc_lookups = (char **)malloc((size_t)(p->nc_nlookups+1) * sizeof(char *)); - if (p->nc_lookups == NULL) { - free(p->nc_netid); -+ free(p); -+ free(tmp); - return(NULL); - } - for (i=0; i < p->nc_nlookups; i++) { -diff --git a/src/getnetpath.c b/src/getnetpath.c -index 7c19932..ea1a18c 100644 ---- a/src/getnetpath.c -+++ b/src/getnetpath.c -@@ -88,6 +88,7 @@ setnetpath() - } - if ((np_sessionp->nc_handlep = setnetconfig()) == NULL) { - syslog (LOG_ERR, "rpc: failed to open " NETCONFIG); -+ free(np_sessionp); - return (NULL); - } - np_sessionp->valid = NP_VALID; -diff --git a/src/rpc_generic.c b/src/rpc_generic.c -index 589cbd5..51f36ac 100644 ---- a/src/rpc_generic.c -+++ b/src/rpc_generic.c -@@ -319,6 +319,7 @@ __rpc_setconf(nettype) - handle->nflag = FALSE; - break; - default: -+ free(handle); - return (NULL); - } - -diff --git a/src/rpc_soc.c b/src/rpc_soc.c -index 5a6eeb7..a85cb17 100644 ---- a/src/rpc_soc.c -+++ b/src/rpc_soc.c -@@ -663,15 +663,17 @@ svcunix_create(sock, sendsize, recvsize, path) - strcmp(nconf->nc_protofmly, NC_LOOPBACK) == 0) - break; - } -- if (nconf == NULL) -+ if (nconf == NULL) { -+ endnetconfig(localhandle); - return(xprt); -+ } - - if ((sock = __rpc_nconf2fd(nconf)) < 0) - goto done; - - memset(&sun, 0, sizeof sun); - sun.sun_family = AF_LOCAL; -- strncpy(sun.sun_path, path, sizeof(sun.sun_path)); -+ strncpy(sun.sun_path, path, (sizeof(sun.sun_path)-1)); - addrlen = sizeof(struct sockaddr_un); - sa = (struct sockaddr *)&sun; - -@@ -692,6 +694,8 @@ svcunix_create(sock, sendsize, recvsize, path) - } - - xprt = (SVCXPRT *)svc_tli_create(sock, nconf, &taddr, sendsize, recvsize); -+ if (xprt == NULL) -+ close(sock); - - done: - endnetconfig(localhandle); -diff --git a/src/rpcb_clnt.c b/src/rpcb_clnt.c -index e45736a..0c34cb7 100644 ---- a/src/rpcb_clnt.c -+++ b/src/rpcb_clnt.c -@@ -547,6 +547,7 @@ try_nconf: - if (tmpnconf == NULL) { - rpc_createerr.cf_stat = RPC_UNKNOWNPROTO; - mutex_unlock(&loopnconf_lock); -+ endnetconfig(nc_handle); - return (NULL); - } - loopnconf = getnetconfigent(tmpnconf->nc_netid); -diff --git a/src/rtime.c b/src/rtime.c -index b642840..29fbf0a 100644 ---- a/src/rtime.c -+++ b/src/rtime.c -@@ -90,6 +90,7 @@ rtime(addrp, timep, timeout) - - /* TCP and UDP port are the same in this case */ - if ((serv = getservbyname("time", "tcp")) == NULL) { -+ do_close(s); - return(-1); - } - -diff --git a/src/svc_generic.c b/src/svc_generic.c -index 52a56c2..20abaa2 100644 ---- a/src/svc_generic.c -+++ b/src/svc_generic.c -@@ -113,6 +113,7 @@ svc_create(dispatch, prognum, versnum, nettype) - if (l == NULL) { - warnx("svc_create: no memory"); - mutex_unlock(&xprtlist_lock); -+ __rpc_endconf(handle); - return (0); - } - l->xprt = xprt; -diff --git a/src/svc_simple.c b/src/svc_simple.c -index cb58002..c32fe0a 100644 ---- a/src/svc_simple.c -+++ b/src/svc_simple.c -@@ -157,6 +157,7 @@ rpc_reg(prognum, versnum, procnum, progname, inproc, outproc, nettype) - ((netid = strdup(nconf->nc_netid)) == NULL)) { - warnx(rpc_reg_err, rpc_reg_msg, __no_mem_str); - SVC_DESTROY(svcxprt); -+ free(xdrbuf); - break; - } - madenow = TRUE; diff --git a/libtirpc-1-1-5-rc2.patch b/libtirpc-1-1-5-rc2.patch deleted file mode 100644 index 1873806..0000000 --- a/libtirpc-1-1-5-rc2.patch +++ /dev/null @@ -1,148 +0,0 @@ -git diff libtirpc-1-1-5-rc1..libtirpc-1-1-5-rc2 - -Commits: -3a17941 Fix EOF detection on non-blocking socket -e80e668 getrpcent.c: fix typo -9e738df __getpublickey_real: Removed a warning -959b200 getnetconfig.c: fix a BAD_FREE (CWE-763) - -Signed-off-by: Petr Vorel -diff --git a/src/getnetconfig.c b/src/getnetconfig.c -index d67d97d..cfd33c2 100644 ---- a/src/getnetconfig.c -+++ b/src/getnetconfig.c -@@ -681,6 +681,7 @@ struct netconfig *ncp; - { - struct netconfig *p; - char *tmp; -+ char *t; - u_int i; - - if ((tmp=malloc(MAXNETCONFIGLINE)) == NULL) -@@ -700,22 +701,21 @@ struct netconfig *ncp; - */ - *p = *ncp; - p->nc_netid = (char *)strcpy(tmp,ncp->nc_netid); -- tmp = strchr(tmp, 0) + 1; -- p->nc_protofmly = (char *)strcpy(tmp,ncp->nc_protofmly); -- tmp = strchr(tmp, 0) + 1; -- p->nc_proto = (char *)strcpy(tmp,ncp->nc_proto); -- tmp = strchr(tmp, 0) + 1; -- p->nc_device = (char *)strcpy(tmp,ncp->nc_device); -+ t = strchr(tmp, 0) + 1; -+ p->nc_protofmly = (char *)strcpy(t,ncp->nc_protofmly); -+ t = strchr(t, 0) + 1; -+ p->nc_proto = (char *)strcpy(t,ncp->nc_proto); -+ t = strchr(t, 0) + 1; -+ p->nc_device = (char *)strcpy(t,ncp->nc_device); - p->nc_lookups = (char **)malloc((size_t)(p->nc_nlookups+1) * sizeof(char *)); - if (p->nc_lookups == NULL) { -- free(p->nc_netid); - free(p); - free(tmp); - return(NULL); - } - for (i=0; i < p->nc_nlookups; i++) { -- tmp = strchr(tmp, 0) + 1; -- p->nc_lookups[i] = (char *)strcpy(tmp,ncp->nc_lookups[i]); -+ t = strchr(t, 0) + 1; -+ p->nc_lookups[i] = (char *)strcpy(t,ncp->nc_lookups[i]); - } - return(p); - } -diff --git a/src/getpublickey.c b/src/getpublickey.c -index 8cf4dc2..be37a24 100644 ---- a/src/getpublickey.c -+++ b/src/getpublickey.c -@@ -74,7 +74,7 @@ __getpublickey_real(netname, publickey) - return (0); - } - *p = '\0'; -- (void) strncpy(publickey, lookup, HEXKEYBYTES); -+ memcpy(publickey, lookup, HEXKEYBYTES); - publickey[HEXKEYBYTES] = '\0'; - return (1); - } -diff --git a/src/getrpcent.c b/src/getrpcent.c -index cba4cd8..e49dc05 100644 ---- a/src/getrpcent.c -+++ b/src/getrpcent.c -@@ -100,7 +100,7 @@ _rpcdata() - return (d); - } - --#if !HAVE_GETRPCBYNYMBER -+#if !HAVE_GETRPCBYNUMBER - struct rpcent * - getrpcbynumber(number) - int number; -diff --git a/src/svc_vc.c b/src/svc_vc.c -index 97a76a3..c23cd36 100644 ---- a/src/svc_vc.c -+++ b/src/svc_vc.c -@@ -502,9 +502,14 @@ read_vc(xprtp, buf, len) - cfp = (struct cf_conn *)xprt->xp_p1; - - if (cfp->nonblock) { -+ /* Since len == 0 is returned on zero length -+ * read or EOF errno needs to be reset before -+ * the read -+ */ -+ errno = 0; - len = read(sock, buf, (size_t)len); - if (len < 0) { -- if (errno == EAGAIN) -+ if (errno == EAGAIN || errno == EWOULDBLOCK) - len = 0; - else - goto fatal_err; -diff --git a/src/xdr_rec.c b/src/xdr_rec.c -index 7d535cf..676cc82 100644 ---- a/src/xdr_rec.c -+++ b/src/xdr_rec.c -@@ -61,6 +61,7 @@ - #include - #include - #include -+#include - #include "rpc_com.h" - static bool_t xdrrec_getlong(XDR *, long *); - static bool_t xdrrec_putlong(XDR *, const long *); -@@ -537,7 +538,13 @@ __xdrrec_getrec(xdrs, statp, expectdata) - n = rstrm->readit(rstrm->tcp_handle, rstrm->in_hdrp, - (int)sizeof (rstrm->in_header) - rstrm->in_hdrlen); - if (n == 0) { -- *statp = expectdata ? XPRT_DIED : XPRT_IDLE; -+ /* EAGAIN or EWOULDBLOCK means a zero length -+ * read not an EOF. -+ */ -+ if (errno == EAGAIN || errno == EWOULDBLOCK) -+ *statp = XPRT_IDLE; -+ else -+ *statp = expectdata ? XPRT_DIED : XPRT_IDLE; - return FALSE; - } - if (n < 0) { -@@ -564,6 +571,7 @@ __xdrrec_getrec(xdrs, statp, expectdata) - rstrm->in_header &= ~LAST_FRAG; - rstrm->last_frag = TRUE; - } -+ rstrm->in_haveheader = 1; - } - - n = rstrm->readit(rstrm->tcp_handle, -@@ -576,7 +584,13 @@ __xdrrec_getrec(xdrs, statp, expectdata) - } - - if (n == 0) { -- *statp = expectdata ? XPRT_DIED : XPRT_IDLE; -+ /* EAGAIN or EWOULDBLOCK means a zero length -+ * read not an EOF. -+ */ -+ if (errno == EAGAIN || errno == EWOULDBLOCK) -+ *statp = XPRT_IDLE; -+ else -+ *statp = expectdata ? XPRT_DIED : XPRT_IDLE; - return FALSE; - } - diff --git a/libtirpc-1.1.4.tar.bz2 b/libtirpc-1.1.4.tar.bz2 deleted file mode 100644 index 09872c8..0000000 --- a/libtirpc-1.1.4.tar.bz2 +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:2ca529f02292e10c158562295a1ffd95d2ce8af97820e3534fe1b0e3aec7561d -size 510924 diff --git a/libtirpc-1.2.5.tar.bz2 b/libtirpc-1.2.5.tar.bz2 new file mode 100644 index 0000000..481d594 --- /dev/null +++ b/libtirpc-1.2.5.tar.bz2 @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f3b6350c7e9c3cd9c58fc7a5e5f8e6be469cc571bb5eb31eb9790b3e675186ca +size 513146 diff --git a/libtirpc.changes b/libtirpc.changes index becb0c6..b5b2155 100644 --- a/libtirpc.changes +++ b/libtirpc.changes @@ -1,3 +1,23 @@ +------------------------------------------------------------------- +Fri Jan 3 15:45:16 UTC 2020 - Petr Vorel + +- Update to libtirpc 1.2.5 + - A number resource leaks and other issues were fix which were identified + by a Coverity Scan. + - The AUTH_DES authentication has been deprecated. If any of those routines + are called, they will fail immediately. + - numerous bug fixes + +- Package changes: + - Build without AUTH_DES authentication + - Add patch from next release 0001-Add-authdes_seccreate-stub.patch + (a86b4ff Add authdes_seccreate() stub) + - Drop rc patches (libtirpc-1-1-5-rc1.patch, libtirpc-1-1-5-rc2.patch) + - Drop patches all patches backported from this release + (0001-Makefile.am-Use-LIBADD-instead-of-LDFLAGS-to-link-ag.patch, + 0002-man-rpc_secure.3t-Fix-typo-in-manpage.patch, + 0003-xdr-add-a-defensive-mask-in-xdr_int64_t-and-xdr_u_in.patch) + ------------------------------------------------------------------- Tue Nov 12 10:24:59 UTC 2019 - Petr Vorel diff --git a/libtirpc.spec b/libtirpc.spec index 6c3efd3..3fe1469 100644 --- a/libtirpc.spec +++ b/libtirpc.spec @@ -1,7 +1,7 @@ # # spec file for package libtirpc # -# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2020 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -18,7 +18,7 @@ Name: libtirpc # src/crypt_client.c and tirpc/rpcsvc/crypt.x have the BSD advertising clause -Version: 1.1.4 +Version: 1.2.5 Release: 0 Summary: Transport Independent RPC Library License: BSD-3-Clause @@ -31,14 +31,10 @@ BuildRequires: krb5-devel BuildRequires: autoconf BuildRequires: libtool BuildRequires: pkg-config -Url: https://sourceforge.net/projects/libtirpc/ +URL: https://sourceforge.net/projects/libtirpc/ Source: %{name}-%{version}.tar.bz2 Source1: baselibs.conf -Patch0: libtirpc-1-1-5-rc1.patch -Patch1: libtirpc-1-1-5-rc2.patch -Patch2: 0001-Makefile.am-Use-LIBADD-instead-of-LDFLAGS-to-link-ag.patch -Patch3: 0002-man-rpc_secure.3t-Fix-typo-in-manpage.patch -Patch4: 0003-xdr-add-a-defensive-mask-in-xdr_int64_t-and-xdr_u_in.patch +Patch0: 0001-Add-authdes_seccreate-stub.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build %define debug_package_requires libtirpc3 = %{version}-%{release} @@ -84,10 +80,6 @@ TCP over IPv4. %prep %setup -q -n %name-%version %patch0 -p1 -%patch1 -p1 -%patch2 -p1 -%patch3 -p1 -%patch4 -p1 %build sed -i -e 's|@includedir@/tirpc|@includedir@|g' libtirpc.pc.in