- rework the README a bit, install notes may still need some fixes
- note: run daily.sh as _librenms after installing the new version to
update schemas, you will see errors when you try to login if you don't
do this.
- note: some things moved from symbolic links to real files which
pkg_add -u doesn't cope with (this is the same case as "exotest" in
regress/usr.sbin/pkg_add). pkg_delete then pkg_add when updating.
@ask-update is used in the plist to try to warn you and ask you to
cancel during the update in this case.
* Uses the proposed update to net/libtorrent-rasterbar 1.2.3 that moves
to python 3 and proposed fix for devel/boost python 3 bindings.
* python 2 is an optional dependency used at runtime for this port for
some runtime search plugin stuff among other things. I left it as is.
* Builds translations
* Regen WANTLIB
Changelog:
118af03534/Changelog
Diff and notes above from Nam Nguyen, OK kn@
This is a security fix release, which addresses an issue that affects
32-bit arches when dnscrypt-proxy's DNS over HTTPS (DoH) feature is
used. It was fixed in Go 1.13.7 (now available in ports) and in the
version of golang.org/x/crypto specified in {WRKSRC}/go.mod.
Release notes: https://github.com/DNSCrypt/dnscrypt-proxy/releases
From Nam Nguyen <namn AT berkeley DOT edu> (MAINTAINER).
Those are registered as CVE-2016-9843, CVE-2016-9842, CVE-2016-9841,
CVE-2016-9840, but judging from the code, it's not even clear how to build
an exploit from this (mostly underspecified C behavior, plus it's deep
within zlib's streams).
So, don't get too alarmed about this.
Okay sthen@, naddy@
* TUI: Fall back to username when display_name is unset
* Show character count when composing
* Fix searching by hashtag which include the '#'
* Upgrade search to v2
Fixes for:
o CVE-2019-14902:
The implementation of ACL inheritance in the Samba AD DC was not complete,
and so absent a 'full-sync' replication, ACLs could get out of sync between
domain controllers.
o CVE-2019-14907:
When processing untrusted string input Samba can read past the end of the
allocated buffer when printing a "Conversion error" message to the logs.
o CVE-2019-19344:
During DNS zone scavenging (of expired dynamic entries) there is a read of
memory after it has been freed.