comparison CHANGES @ 302:973fccb59ea4 ucc-axis-hack

propagate from branch 'au.asn.ucc.matt.dropbear' (head 11034278bd1917bebcbdc69cf53b1891ce9db121) to branch 'au.asn.ucc.matt.dropbear.ucc-axis-hack' (head 10a1f614fec73d0820c3f61160d9db409b9beb46)
author Matt Johnston <matt@ucc.asn.au>
date Sat, 25 Mar 2006 12:59:58 +0000
parents 03f65e461915
children bfa09e369e0e
comparison
equal deleted inserted replaced
299:740e782679be 302:973fccb59ea4
1 0.48.1 - Sat 11 March 2006
2
3 - Compile fix for scp
4
5 0.48 - Thurs 9 March 2006
6
7 - Check that the circular buffer is properly empty before
8 closing a channel, which could cause truncated transfers
9 (thanks to Tomas Vanek for helping track it down)
10
11 - Implement per-IP pre-authentication connection limits
12 (after some poking from Pablo Fernandez)
13
14 - Exit gracefully if trying to connect to as SSH v1 server
15 (reported by Rushi Lala)
16
17 - Only read /dev/random once at startup when in non-inetd mode
18
19 - Allow ctrl-c to close a dbclient password prompt (may
20 still have to press enter on some platforms)
21
22 - Merged in uClinux patch for inetd mode
23
24 - Updated to scp from OpenSSH 4.3p2 - fixes a security issue
25 where use of system() could cause users to execute arbitrary
26 code through malformed filenames, ref CVE-2006-0225
27
1 0.47 - Thurs Dec 8 2005 28 0.47 - Thurs Dec 8 2005
2 29
3 - SECURITY: fix for buffer allocation error in server code, could potentially 30 - SECURITY: fix for buffer allocation error in server code, could potentially
4 allow authenticated users to gain elevated privileges. All multi-user systems 31 allow authenticated users to gain elevated privileges. All multi-user systems
5 running the server should upgrade (or apply the patch available on the 32 running the server should upgrade (or apply the patch available on the