dtc 1.4.6 was released 2018/01/03 with various additional checks and
bugfixes, as well as support for some syntactic sugar for overlays that
allows the following:
==
/dts-v1/;
/plugin/;
&foo {
status = "okay";
};
==
Issues addressed by the previous patches have been fixed upstream, and the
two patches included here have been accepted upstream following the release
of 1.4.6. The patches, along with the TEST_ENV, will be able to go away when
1.4.7 is released.
While here, hook up the test suite and flip maintainer over to uboot@.
Reviewed by: imp, manu
Approved by: imp (maintainer, ports committer)
Differential Revision: https://reviews.freebsd.org/D13761
This includes a band-aid for running 64bit PV guests without
compromising the whole system.
Commit the makefile diff left behind in r459786.
MFH: 2018Q1
Sponsored by: Citrix Systems R&D
SC2068: Double quote array expansions to avoid re-splitting elements.
SC2034: revs appears unused. Verify it or export it.
SC2039: In POSIX sh, XXX is undefined.
type -> command -v
echo -n -> printf
read -p -> printf + read
SC2162: read without -r will mangle backslashes.
SC2086: Double quote to prevent globbing and word splitting.
Sponsored by: Absolight
Freeplane is a free and open source software application that supports
thinking, sharing information and getting things done at work, in
school and at home. The software can be used for mind mapping and
analyzing the information contained in mind maps.
WWW: https://www.freeplane.org/
PR: 225399
Submitted by: lbartoletti@tuxfamily.org
aarch64. The patch basically extends existing ``... || defined()'' chain
of checks; ideally, this whole STB_PTR64-related code should be rewritten
in architecture name agnostic way.
- Fixes "PowerDNS Security Advisory 2018-01: Insufficient validation
of DNSSEC signatures". An issue has been found in the DNSSEC
validation component of PowerDNS Recursor, allowing an ancestor
delegation NSEC or NSEC3 record to be used to wrongfully prove the
non-existence of a RR below the owner name of that record. This
would allow an attacker in position of man-in-the-middle to send a
NXDOMAIN answer for a name that does exist.
The 4.0.x branch is not vulnerable.
- Add support for algo16 and simplify Lua/LuaJIT engine choice.
PR: 225397
Submitted by: maintainer
Security: CVE-2018-1000003
- In Heimdal 7.1 through 7.4, remote unauthenticated
attackers are able to crash the KDC by sending a crafted UDP packet
containing empty data fields for client name or realm.
Security: CVE-2017-17439
PR: 224191
KeePassRPC is a KeePass plugin that allows applications to transfer passwords to
and from KeePass.
One such application is the Kee plugin for Firefox, which adds free, secure and
easy to use password management features to your web browser which save you time
and keep your private data more secure.
WWW: https://www.kee.pm/