summaryrefslogtreecommitdiffhomepage
path: root/debian/changelog
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2006-06-07 16:04:14 +0000
committerMatt Johnston <matt@ucc.asn.au>2006-06-07 16:04:14 +0000
commit64bdc502add53c7e579a68cd0d3806e8942ab67d (patch)
treea4f521b84213ebc13785e8281205b6ac7712ed5c /debian/changelog
parentc81e058bb05b274b9a88e684ffd95a03a0ac4377 (diff)
Bring in changes from Debian 0.48.1-1
--HG-- extra : convert_revision : 3f4f459f96e821b16461b85b98a3cfd81c916786
Diffstat (limited to 'debian/changelog')
-rw-r--r--debian/changelog28
1 files changed, 23 insertions, 5 deletions
diff --git a/debian/changelog b/debian/changelog
index 4bdb895..7152341 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,14 +1,32 @@
-dropbear (0.48-0.1) unstable; urgency=high
+dropbear (0.48.1-1) unstable; urgency=medium
+
+ * new upstream point release.
+ * Compile fix for scp
+ * debian/diff/dbclient.1.diff: new: document -R option to dbclient
+ accurately (thx Markus Schaber; closes: #351882).
+ * debian/dropbear.README.Debian: document a workaround for systems with
+ possibly blocking /dev/random device (closes: #355414)..
+
+ -- Gerrit Pape <pape@smarden.org> Sun, 16 Apr 2006 16:16:40 +0000
+
+dropbear (0.48-1) unstable; urgency=medium
* New upstream release.
- * SECURITY: Improve handling of denial of service attempts from a single IP.
+ * SECURITY: Improve handling of denial of service attempts from a single
+ IP.
+
+ * debian/implicit: update to revision 1.11.
+ * new upstream release updates to scp from OpenSSH 4.3p2 - fixes a
+ security issue where use of system() could cause users to execute
+ arbitrary code through malformed filenames; CVE-2006-0225 (see also
+ #349645); the scp binary is not provided by this package though.
- -- Matt Johnston <matt@ucc.asn.au> Thu, 8 Mar 2006 19:20:21 +0800
+ -- Gerrit Pape <pape@smarden.org> Fri, 10 Mar 2006 22:00:32 +0000
-dropbear (0.47-0.1) unstable; urgency=high
+dropbear (0.47-1) unstable; urgency=high
* New upstream release.
- * SECURITY: Fix incorrect buffer sizing.
+ * SECURITY: Fix incorrect buffer sizing; CVE-2005-4178.
-- Matt Johnston <matt@ucc.asn.au> Thu, 8 Dec 2005 19:20:21 +0800