Mercurial > dropbear
comparison CHANGES @ 302:973fccb59ea4 ucc-axis-hack
propagate from branch 'au.asn.ucc.matt.dropbear' (head 11034278bd1917bebcbdc69cf53b1891ce9db121)
to branch 'au.asn.ucc.matt.dropbear.ucc-axis-hack' (head 10a1f614fec73d0820c3f61160d9db409b9beb46)
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Sat, 25 Mar 2006 12:59:58 +0000 |
parents | 03f65e461915 |
children | bfa09e369e0e |
comparison
equal
deleted
inserted
replaced
299:740e782679be | 302:973fccb59ea4 |
---|---|
1 0.48.1 - Sat 11 March 2006 | |
2 | |
3 - Compile fix for scp | |
4 | |
5 0.48 - Thurs 9 March 2006 | |
6 | |
7 - Check that the circular buffer is properly empty before | |
8 closing a channel, which could cause truncated transfers | |
9 (thanks to Tomas Vanek for helping track it down) | |
10 | |
11 - Implement per-IP pre-authentication connection limits | |
12 (after some poking from Pablo Fernandez) | |
13 | |
14 - Exit gracefully if trying to connect to as SSH v1 server | |
15 (reported by Rushi Lala) | |
16 | |
17 - Only read /dev/random once at startup when in non-inetd mode | |
18 | |
19 - Allow ctrl-c to close a dbclient password prompt (may | |
20 still have to press enter on some platforms) | |
21 | |
22 - Merged in uClinux patch for inetd mode | |
23 | |
24 - Updated to scp from OpenSSH 4.3p2 - fixes a security issue | |
25 where use of system() could cause users to execute arbitrary | |
26 code through malformed filenames, ref CVE-2006-0225 | |
27 | |
1 0.47 - Thurs Dec 8 2005 | 28 0.47 - Thurs Dec 8 2005 |
2 | 29 |
3 - SECURITY: fix for buffer allocation error in server code, could potentially | 30 - SECURITY: fix for buffer allocation error in server code, could potentially |
4 allow authenticated users to gain elevated privileges. All multi-user systems | 31 allow authenticated users to gain elevated privileges. All multi-user systems |
5 running the server should upgrade (or apply the patch available on the | 32 running the server should upgrade (or apply the patch available on the |