Mercurial > dropbear
diff debian/changelog @ 435:337c45621e81
merge of 'a9b0496634cdd25647b65e585cc3240f3fa699ee'
and 'c22be8b8f570b48e9662dac32c7b3e7148a42206'
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 22 Feb 2007 14:53:49 +0000 |
parents | 67689b7ceaf0 |
children | 7319d229799a |
line wrap: on
line diff
--- a/debian/changelog Thu Feb 22 14:52:46 2007 +0000 +++ b/debian/changelog Thu Feb 22 14:53:49 2007 +0000 @@ -1,14 +1,38 @@ -dropbear (0.48-0.1) unstable; urgency=high +dropbear (0.49test1-0.1) unstable; urgency=low * New upstream release. - * SECURITY: Improve handling of denial of service attempts from a single IP. + + -- Matt Johnston <[email protected]> Mon, 12 Feb 2007 23:59:00 +0900 + +dropbear (0.48.1-1) unstable; urgency=medium - -- Matt Johnston <[email protected]> Thu, 8 Mar 2006 19:20:21 +0800 + * new upstream point release. + * Compile fix for scp + * debian/diff/dbclient.1.diff: new: document -R option to dbclient + accurately (thx Markus Schaber; closes: #351882). + * debian/dropbear.README.Debian: document a workaround for systems with + possibly blocking /dev/random device (closes: #355414).. -dropbear (0.47-0.1) unstable; urgency=high + -- Gerrit Pape <[email protected]> Sun, 16 Apr 2006 16:16:40 +0000 + +dropbear (0.48-1) unstable; urgency=medium * New upstream release. - * SECURITY: Fix incorrect buffer sizing. + * SECURITY: Improve handling of denial of service attempts from a single + IP. + + * debian/implicit: update to revision 1.11. + * new upstream release updates to scp from OpenSSH 4.3p2 - fixes a + security issue where use of system() could cause users to execute + arbitrary code through malformed filenames; CVE-2006-0225 (see also + #349645); the scp binary is not provided by this package though. + + -- Gerrit Pape <[email protected]> Fri, 10 Mar 2006 22:00:32 +0000 + +dropbear (0.47-1) unstable; urgency=high + + * New upstream release. + * SECURITY: Fix incorrect buffer sizing; CVE-2005-4178. -- Matt Johnston <[email protected]> Thu, 8 Dec 2005 19:20:21 +0800