8edb4a1f0c
As a consequence, libcairo may call shmget after pledge. Reproduce with
'i3-nagbar -f whatever'. Thus, postpone the pledge to avoid an abort.
ok dcoppa
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01
mentions 3 security issues, at least CVE-2017-2784 (Freeing of memory
allocated on stack when validating a public key with a secp224k1 curve)
affects mbedtls-2.2.1.
Packaging:
- bump major of shared libs since symbols have been removed
- tweak license marker
- kill code in testsuite that fails to build with our stdio
implementation (can't take the address of stdout, the C standard
warns about that)
- kill some debug flags set by cmake
Make test passes on amd64 and arm, also tests & ok juanfra@
information.
Tweak and ok jca@
lscpu gathers CPU architecture information about the current CPU. The
command output is optimized for parsing or for easy readability by
humans. The information includes, for example, the number of CPUs,
threads, cores, and sockets.
There is also information about the CPU caches, family, model, byte
order, and stepping.
New releases after ~15 years. The main reason is probably to address
the "unescaped left curly braces" warning in perl regular expressions,
which should become fatal soon.
- fixes a security issue in the ContentLine analyzer. In rare cases
a bug in the ContentLine analyzer can lead to an out of bound write of a
single byte. This allows a remote attacker to crash Bro; there also is a
possibility this can be exploited in other ways.