From patchwork Mon Sep 18 14:16:56 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 7207 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4Rq6N72M3Rz3ws3 for ; Mon, 18 Sep 2023 14:18:31 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4Rq6Mv5VLQz3ft; Mon, 18 Sep 2023 14:18:19 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4Rq6Mv4x9Cz2yPg; Mon, 18 Sep 2023 14:18:19 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4Rq6Ms2y8Sz2y0d for ; Mon, 18 Sep 2023 14:18:17 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4Rq6Mr5PmSz1x0; Mon, 18 Sep 2023 14:18:16 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1695046696; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=TOuE1XDO/XgfNhzlv+5wWnSEliGaROP9dbBOnbrbCJM=; b=nFjBeb23ak1FgNfayHAQJ6sujrW1Y+nkFDmHKw/x4u9mZ34O5AmAryt8pDUeyxRcTNtAqE M/ukO99lEuQcLNAg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1695046696; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=TOuE1XDO/XgfNhzlv+5wWnSEliGaROP9dbBOnbrbCJM=; b=wNwkIJr6zVXnJs7upjCq8eVYVNH5sD2xCDhGwEe3tWnsa3IgI3E7Gzp5AGaySDOMzxphYp Xzoo5aG9ExCN9biVr9hoFRo5SKwesfm5F6fiKw1Z41fFVddPyMJRM5kA8hWu9YjOlLGrfA g0PmUcsmsS5rK6Q72Fda0vpvy9fNH56qo7ddclgY5ujfePkYN/zxM43TI7D0m7Ctb6DL1P P6mHFdxt2uQadZYQ7EkvNdXYFZZUNTSFPyODrhS/SxVYacHUDlN0jJySTdHLk1Ktrj7+GO d+GTFCCeM+YzZmCxyx6hm5K7bWICR0LA51686DAntqe9TrijuVO6gdFy98lNcw== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH 3/4] apr-util: Update version to 1.6.3 and add libxcrypt as dependency Date: Mon, 18 Sep 2023 16:16:56 +0200 Message-ID: <20230918141810.536112-3-adolf.belka@ipfire.org> In-Reply-To: <20230918141810.536112-1-adolf.belka@ipfire.org> References: <20230918141810.536112-1-adolf.belka@ipfire.org> MIME-Version: 1.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" - IPFire3.x - Update version from 1.6.1 to 1.6.3 - libxcrypt dependency required for apache - Changelog 1.6.3 *) Correct a packaging issue in 1.6.2. The contents of the release were correct, but the top level directory was misnamed. 1.6.2 *) SECURITY: CVE-2022-25147 (cve.mitre.org) Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. *) Teach configure how to find and build against MariaDB 10.2. PR 61517 [Kris Karas ] *) apr_crypto_commoncrypto: Remove stray reference to -lcrypto that prevented commoncrypto being enabled. [Graham Leggett] *) Add --tag=CC to libtool invocations. PR 62640. [Michael Osipov] *) apr_dbm_gdbm: Fix handling of error codes. This makes gdbm 1.14 work. apr_dbm_gdbm will now also return error codes starting with APR_OS_START_USEERR, as apr_dbm_berkleydb does, instead of always returning APR_EGENERAL. [Stefan Fritsch] Signed-off-by: Adolf Belka --- apr-util/apr-util.nm | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/apr-util/apr-util.nm b/apr-util/apr-util.nm index ab4e1655d..f9b8fc4dc 100644 --- a/apr-util/apr-util.nm +++ b/apr-util/apr-util.nm @@ -4,8 +4,8 @@ ############################################################################### name = apr-util -version = 1.6.1 -release = 2.2 +version = 1.6.3 +release = 3 groups = System/Libraries url = https://apr.apache.org/ @@ -28,6 +28,7 @@ build expat-devel libuuid-devel openssl-devel + libxcrypt-devel end configure_options += \