backout r1.243 (fix for fatal during tab-completion with some multibyte
sequences) as it breaks the common case for tab completion.
Will deal with it properly after release.
Make the m88k disassembler recognize more forms of ld and st instructions,
especially in scaled mode. Helps gdb correctly disassemble the code gcc can
produce...
Prepare for changes to the decice tree bindings that are being made now
that support for the Apple version of the DWC3 controllers is being
upstreamed. In particular we'll lose the "snps,dwc3" compatible because
the way the Linux driver is structured.
ok jsg@
Apparently we can't have "generic" compatibles anymore, even though they
were accepted when support for the M1 and M1 Pro chips was upstreamed. So
now we have an incoherent mess where we need to add the right SoC-specific
compatble to the list of compatibles to make sure drivers still attach when
we update device trees to the latest Linux versions.
ok jsg@
Device tree bindings for the RK3568 changed during the upstreaming process.
Match on "rockchip,rk3568-rng" such that this driver attaches again when
using the current U-Bott that we ship in the u-boot-rk356x package.
ok phessler@
cms_RecipientInfo_pwri_crypt: fix incorrect return check
cms_RecipientInfo_pwri_crypt: plug leak of kekalg
cms: fix incorrect length check in kek_unwrap_key()
An incorrect length check can result in a 4-byte overwrite and an
8-byte overread.
From Stanislav Fort and Viktor Dukhovni via OpenSSL.
CVE-2025-9230.
ok jsing
this is errata/7.6/023_libcrypto.patch.sig
cms_RecipientInfo_pwri_crypt: fix incorrect return check
cms_RecipientInfo_pwri_crypt: plug leak of kekalg
cms: fix incorrect length check in kek_unwrap_key()
An incorrect length check can result in a 4-byte overwrite and an
8-byte overread.
From Stanislav Fort and Viktor Dukhovni via OpenSSL.
CVE-2025-9230.
ok jsing
this is errata/7.7/010_libcrypto.patch.sig
cms: fix incorrect length check in kek_unwrap_key()
An incorrect length check can result in a 4-byte overwrite and an
8-byte overread.
From Stanislav Fort and Viktor Dukhovni via OpenSSL.
CVE-2025-9230.
ok jsing
Rather than a raw 'p' in the informational message for disklabel -e,
create the letter dynamically from MAXPARTITIONS-1 using the
DL_PARTNUM2NAME() macro which can convert it to a-zA-Z.
ok krw
during sftp uploads, avoid a condition where a failed write could
be ignored if a subsequent write succeeded.
This is unlikely but technically possible because sftp servers are
allowed to reorder requests.
Reported by Graziano Stefani, ok tb@
avoid a fatal() when sftp tab-completes filenames that share
common utf-8 characters that don't encode to a complete codepoint
from menthu.zhou via GHPR#587; ok dtucker@
IS_ALDERLAKE_P shouldn't be used in inteldrm_attach() as runtime info
is not initialised until inteldrm_attachhook()
Problem reported, fix tested and ok tb@
Add explicit check for array overflow. The array is bounded by a
NULL sentinel which already prevents this, however since we check
the bit vector for overflow Coverity assumes that check is for the
devices array and flags it as a potential overflow. Adding this
additional check on the array placates CID 896018. ok djm@ deraadt@
Due to the way the save area for the registers used for argument passing is
set up in variadic functions with the "new" frame layout, make sure that
variadic functions always setup a frame pointer, even if they qualify for
omitting them (e.g. variadic leaf functions which do not call alloca or use
exceptions), as their save area is relative to %r30.
This buglet amazingly went unnoticed as it was apparently not blatant enough
to break the gcc testsuite - the only piece of code it broke horribly was
the mvme88k boot blocks.