* Mon Feb 17 2025 thomas.blume@suse.com
- update to 1.3.6:
* configure.ac: Using autoupdate updated to the latest autoconf macros
* svc_fd_create: skip getsockname on a non-network socket
* detect whether linker supports --version-script
* check for gss_pname_to_uid or hardcode an early return if we can't use aname to localname
* test for IPV6_PKTINFO and potentially define __APPLE_USE_RFC_3542 to expose
* macos uses the same mutex primitives as linux and so can use these defines
* check for struct rpcent in netdb.h before redefining
* include string.h when we need a memset prototype for
* attempt to use machine/endian.h if endian.h does not exist
* updated macOS support for tirpc [2/7] SOL_IP vs IPPROTO_IP
* check for getpeereid
* rpcb_prot.x: Update _PATH_RPCBINDSOCK
* Move rpcbind.sock to /run
- update to 1.3.5:
* Try using a new abstract address when connecting to rpcbind
* Change local_rpcb() to take a targaddr pointer.
* Allow working with abstract AF_UNIX addresses.
* rpcb_clnt.c: memory leak in destroy_addr
* _rpc_dtablesize: Decrease the value of size.
* netconfig: remove tcp6, udp6 on --disable-ipv6
* gssapi: fix rpc_gss_seccreate passed in cred
* Revert commit f5b6e6fdb1e6 "gss-api: expose gss major/minor
error in authgss_refresh()".
* Tue Oct 17 2023 Thomas.Blume@suse.com
- update to 1.3.4 (bsc#1199467)
* binddynport.c honor ip_local_reserved_ports
* gss-api: expose gss major/minor error in authgss_refresh()
* rpcb_clnt.c: Eliminate double frees in delete_cache()
* rpcb_clnt.c: memory leak in destroy_addr
* portmapper: allow TCP-only portmapper
* getnetconfigent: avoid potential DoS issue by removing unnecessary sleep
* clnt_raw.c: fix a possible null pointer dereference
* bindresvport.c: fix a potential resource leakage
* Fri Aug 19 2022 dmueller@suse.com
- update to 1.3.3 (bsc#1201680, CVE-2021-46828):
* Fix DoS vulnerability in libtirpc
* _rpc_dtablesize: use portable system call
* libtirpc: Fix use-after-free accessing the error number
* Fix potential memory leak of parms.r_addr
* rpcb_clnt.c add mechanism to try v2 protocol first
* Eliminate deadlocks in connects with an MT environment
* clnt_dg_freeres() uncleared set active state may deadlock
* thread safe clnt destruction
* SUNRPC: mutexed access blacklist_read state variable
* SUNRPC: MT-safe overhaul of address cache management in rpcb_clnt.c
- drop 0001-Fix-DoS-vulnerability-in-libtirpc.patch (upstream)
* Wed Sep 15 2021 pvorel@suse.cz
- Backport DoS vulnerability fix 0001-Fix-DoS-vulnerability-in-libtirpc.patch
- Replace %setup with %autosetup
* Sun May 16 2021 dmueller@suse.com
- update to 1.3.2:
* Replace the final SunRPC licenses with BSD licenses
* blacklist: Add a few more well known ports
* libtirpc: disallow calling auth_refresh from clnt_call with RPCSEC_GSS
* Wed Dec 23 2020 dimstar@opensuse.org
- Fix sed call to fixup libtirpc.pc.in: as we want our tirpc to be
a transparent drop-in-replacement for rpc, we move the files
from /usr/include/tirpc to /usr/include. Due to an upstream
change in libtirpc.pc.in, though, the existing sed call no longer
matched and no longer corrected the information according to our
package.
* Wed Dec 02 2020 pvorel@suse.cz
- Update to libtirpc 1.3.1
- Remove AUTH_DES interfaces from auth_des.h
The unsupported AUTH_DES authentication has be
compiled out since commit d918e41d889 (Wed Oct 9 2019)
replaced by API routines that return errors.
- svc_dg: Free xp_netid during destroy
- Fix memory management issues of fd locks
- libtirpc: replace array with list for per-fd locks
- __svc_vc_dodestroy: fix double free of xp_ltaddr.buf
- __rpc_dtbsize: rlim_cur instead of rlim_max
- pkg-config: use the correct replacements for libdir/includedir
* Thu Oct 29 2020 lnussel@suse.de
- install libraries to %{_libdir} (boo#1029961)
* Wed Apr 15 2020 pvorel@suse.cz
- Update to libtirpc 1.2.6
- Drop patches all patches backported from this release
(0001-Add-authdes_seccreate-stub.patch,
0001-Avoid-multiple-definiton-with-gcc-fno-common.patch)
* Wed Feb 05 2020 pvorel@suse.cz
- Backport upstream fix daed7ee ("Avoid multiple-definiton with gcc -fno-common")
to fix build error with gcc flag -fno-common (bsc#1160875).
Tested on gcc-9 and gcc-10.
0001-Avoid-multiple-definiton-with-gcc-fno-common.patch