Mercurial > dropbear
diff debian/changelog @ 378:a124aff0cbf1
merge of '182c2d8dbd5321ef4d1df8758936f4dc7127015f'
and '31dcd7a22983ef19d6c63248e415e71d292dd0ec'
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Wed, 06 Dec 2006 13:11:41 +0000 |
parents | bfa09e369e0e |
children | 67689b7ceaf0 |
line wrap: on
line diff
--- a/debian/changelog Wed Dec 06 13:09:32 2006 +0000 +++ b/debian/changelog Wed Dec 06 13:11:41 2006 +0000 @@ -1,14 +1,38 @@ -dropbear (0.48-0.1) unstable; urgency=high +dropbear (0.49-0.1) unstable; urgency=low * New upstream release. - * SECURITY: Improve handling of denial of service attempts from a single IP. + + -- Matt Johnston <[email protected]> Tues, 13 June 2005 19:20:21 +0800 + +dropbear (0.48.1-1) unstable; urgency=medium - -- Matt Johnston <[email protected]> Thu, 8 Mar 2006 19:20:21 +0800 + * new upstream point release. + * Compile fix for scp + * debian/diff/dbclient.1.diff: new: document -R option to dbclient + accurately (thx Markus Schaber; closes: #351882). + * debian/dropbear.README.Debian: document a workaround for systems with + possibly blocking /dev/random device (closes: #355414).. -dropbear (0.47-0.1) unstable; urgency=high + -- Gerrit Pape <[email protected]> Sun, 16 Apr 2006 16:16:40 +0000 + +dropbear (0.48-1) unstable; urgency=medium * New upstream release. - * SECURITY: Fix incorrect buffer sizing. + * SECURITY: Improve handling of denial of service attempts from a single + IP. + + * debian/implicit: update to revision 1.11. + * new upstream release updates to scp from OpenSSH 4.3p2 - fixes a + security issue where use of system() could cause users to execute + arbitrary code through malformed filenames; CVE-2006-0225 (see also + #349645); the scp binary is not provided by this package though. + + -- Gerrit Pape <[email protected]> Fri, 10 Mar 2006 22:00:32 +0000 + +dropbear (0.47-1) unstable; urgency=high + + * New upstream release. + * SECURITY: Fix incorrect buffer sizing; CVE-2005-4178. -- Matt Johnston <[email protected]> Thu, 8 Dec 2005 19:20:21 +0800