diff options
author | Matt Johnston <matt@ucc.asn.au> | 2006-06-07 16:04:14 +0000 |
---|---|---|
committer | Matt Johnston <matt@ucc.asn.au> | 2006-06-07 16:04:14 +0000 |
commit | 64bdc502add53c7e579a68cd0d3806e8942ab67d (patch) | |
tree | a4f521b84213ebc13785e8281205b6ac7712ed5c /debian/changelog | |
parent | c81e058bb05b274b9a88e684ffd95a03a0ac4377 (diff) |
Bring in changes from Debian 0.48.1-1
--HG--
extra : convert_revision : 3f4f459f96e821b16461b85b98a3cfd81c916786
Diffstat (limited to 'debian/changelog')
-rw-r--r-- | debian/changelog | 28 |
1 files changed, 23 insertions, 5 deletions
diff --git a/debian/changelog b/debian/changelog index 4bdb895..7152341 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,14 +1,32 @@ -dropbear (0.48-0.1) unstable; urgency=high +dropbear (0.48.1-1) unstable; urgency=medium + + * new upstream point release. + * Compile fix for scp + * debian/diff/dbclient.1.diff: new: document -R option to dbclient + accurately (thx Markus Schaber; closes: #351882). + * debian/dropbear.README.Debian: document a workaround for systems with + possibly blocking /dev/random device (closes: #355414).. + + -- Gerrit Pape <pape@smarden.org> Sun, 16 Apr 2006 16:16:40 +0000 + +dropbear (0.48-1) unstable; urgency=medium * New upstream release. - * SECURITY: Improve handling of denial of service attempts from a single IP. + * SECURITY: Improve handling of denial of service attempts from a single + IP. + + * debian/implicit: update to revision 1.11. + * new upstream release updates to scp from OpenSSH 4.3p2 - fixes a + security issue where use of system() could cause users to execute + arbitrary code through malformed filenames; CVE-2006-0225 (see also + #349645); the scp binary is not provided by this package though. - -- Matt Johnston <matt@ucc.asn.au> Thu, 8 Mar 2006 19:20:21 +0800 + -- Gerrit Pape <pape@smarden.org> Fri, 10 Mar 2006 22:00:32 +0000 -dropbear (0.47-0.1) unstable; urgency=high +dropbear (0.47-1) unstable; urgency=high * New upstream release. - * SECURITY: Fix incorrect buffer sizing. + * SECURITY: Fix incorrect buffer sizing; CVE-2005-4178. -- Matt Johnston <matt@ucc.asn.au> Thu, 8 Dec 2005 19:20:21 +0800 |