comparison debian/changelog @ 327:1857c2c551ea

Bring in changes from Debian 0.48.1-1
author Matt Johnston <matt@ucc.asn.au>
date Wed, 07 Jun 2006 16:04:14 +0000
parents 55a99934db87
children bfa09e369e0e
comparison
equal deleted inserted replaced
326:d965110e3f5c 327:1857c2c551ea
1 dropbear (0.48-0.1) unstable; urgency=high 1 dropbear (0.48.1-1) unstable; urgency=medium
2
3 * new upstream point release.
4 * Compile fix for scp
5 * debian/diff/dbclient.1.diff: new: document -R option to dbclient
6 accurately (thx Markus Schaber; closes: #351882).
7 * debian/dropbear.README.Debian: document a workaround for systems with
8 possibly blocking /dev/random device (closes: #355414)..
9
10 -- Gerrit Pape <[email protected]> Sun, 16 Apr 2006 16:16:40 +0000
11
12 dropbear (0.48-1) unstable; urgency=medium
2 13
3 * New upstream release. 14 * New upstream release.
4 * SECURITY: Improve handling of denial of service attempts from a single IP. 15 * SECURITY: Improve handling of denial of service attempts from a single
5 16 IP.
6 -- Matt Johnston <[email protected]> Thu, 8 Mar 2006 19:20:21 +0800 17
7 18 * debian/implicit: update to revision 1.11.
8 dropbear (0.47-0.1) unstable; urgency=high 19 * new upstream release updates to scp from OpenSSH 4.3p2 - fixes a
20 security issue where use of system() could cause users to execute
21 arbitrary code through malformed filenames; CVE-2006-0225 (see also
22 #349645); the scp binary is not provided by this package though.
23
24 -- Gerrit Pape <[email protected]> Fri, 10 Mar 2006 22:00:32 +0000
25
26 dropbear (0.47-1) unstable; urgency=high
9 27
10 * New upstream release. 28 * New upstream release.
11 * SECURITY: Fix incorrect buffer sizing. 29 * SECURITY: Fix incorrect buffer sizing; CVE-2005-4178.
12 30
13 -- Matt Johnston <[email protected]> Thu, 8 Dec 2005 19:20:21 +0800 31 -- Matt Johnston <[email protected]> Thu, 8 Dec 2005 19:20:21 +0800
14 32
15 dropbear (0.46-2) unstable; urgency=low 33 dropbear (0.46-2) unstable; urgency=low
16 34