Allwinner boards
Beaglebone Black
Zync boards
For changes on the U-Boot sidesee the changes on their release notes.
For changes on this ports :
Use BINARY_ALIAS for gsed
Add PYTHON=${PYTHON_CMD} to MAKE_ARGS
Add patch from Andrew Turner to export GPT partition in EFI
Tested On: Pine64, OrangePi One, BananaPi M2, BeagleBone Black
Reviewed by: imp (maintainer)
Approved by: imp
Using BINARY_ALIAS, we can trick neomutt into building the manpages and
the neomuttrc. Neomutt already gracefully handles pieces of the documentation
being unavailable during installation, and pkg-create(8) takes care of the
rest.
PORTREVISION bump because the plist has changed for anybody building without
DOCS.
Tokei is a program that displays statistics about your code. Tokei
will show number of files, total lines within those files and code,
comments, and blanks grouped by language.
It is fast, supports over 100 languages, and correctly handles multi
line comments, nested comments, while ignoring comments that are in
strings, providing accurate code statistics.
WWW: https://github.com/Aaronepower/tokei
This version is not compatible with version 2 file system user modules
and is meant to co-exist with the older version of the library.
Reviewed by: antoine (mentor)
A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.
Approved by: leres (maintainer)
Security: https://w1.fi/security/2017-1/ \
wpa-packet-number-reuse-with-replayed-messages.txt
Security: https://www.krackattacks.com/
MFH: 2017Q4
Differential Revision: D12691
2017-10-15 devel/vtcl: This port depends on Tcl/Tk 8.4 , which is no longer maintained. Please port it to 8.5+
2017-10-15 editors/tpad: This port depends on Tcl/Tk 8.4 , which is no longer maintained. Please port it to 8.5+
2017-10-15 games/polypuzzle: This port depends on Tcl/Tk 8.4 , which is no longer maintained. Please port it to 8.5+
2017-10-15 multimedia/nxtvepg: This port depends on Tcl/Tk 8.4 , which is no longer maintained. Please port it to 8.5+
2017-10-15 net/xpvm: This port depends on Tcl/Tk 8.4 , which is no longer maintained. Please port it to 8.5+
2017-10-15 x11/tkXwin: This port depends on Tcl/Tk 8.4 , which is no longer maintained. Please port it to 8.5+
A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.
Security: https://w1.fi/security/2017-1/ \
wpa-packet-number-reuse-with-replayed-messages.txt
Security: https://www.krackattacks.com/
MFH: 2017Q4
Adding PORTREVISION to explicitly bump them after the recent CVE patches
actually caused the revision to go backwards instead of forwards.
PR: 223049
Reported by: mandree