summaryrefslogtreecommitdiff
path: root/debian
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2006-06-07 16:04:14 +0000
committerMatt Johnston <matt@ucc.asn.au>2006-06-07 16:04:14 +0000
commit64bdc502add53c7e579a68cd0d3806e8942ab67d (patch)
treea4f521b84213ebc13785e8281205b6ac7712ed5c /debian
parentc81e058bb05b274b9a88e684ffd95a03a0ac4377 (diff)
downloaddropbear-64bdc502add53c7e579a68cd0d3806e8942ab67d.tar.gz
Bring in changes from Debian 0.48.1-1
--HG-- extra : convert_revision : 3f4f459f96e821b16461b85b98a3cfd81c916786
Diffstat (limited to 'debian')
-rw-r--r--debian/changelog28
-rw-r--r--debian/dropbear.README.Debian11
-rw-r--r--debian/implicit10
3 files changed, 43 insertions, 6 deletions
diff --git a/debian/changelog b/debian/changelog
index 4bdb895..7152341 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,14 +1,32 @@
-dropbear (0.48-0.1) unstable; urgency=high
+dropbear (0.48.1-1) unstable; urgency=medium
+
+ * new upstream point release.
+ * Compile fix for scp
+ * debian/diff/dbclient.1.diff: new: document -R option to dbclient
+ accurately (thx Markus Schaber; closes: #351882).
+ * debian/dropbear.README.Debian: document a workaround for systems with
+ possibly blocking /dev/random device (closes: #355414)..
+
+ -- Gerrit Pape <pape@smarden.org> Sun, 16 Apr 2006 16:16:40 +0000
+
+dropbear (0.48-1) unstable; urgency=medium
* New upstream release.
- * SECURITY: Improve handling of denial of service attempts from a single IP.
+ * SECURITY: Improve handling of denial of service attempts from a single
+ IP.
+
+ * debian/implicit: update to revision 1.11.
+ * new upstream release updates to scp from OpenSSH 4.3p2 - fixes a
+ security issue where use of system() could cause users to execute
+ arbitrary code through malformed filenames; CVE-2006-0225 (see also
+ #349645); the scp binary is not provided by this package though.
- -- Matt Johnston <matt@ucc.asn.au> Thu, 8 Mar 2006 19:20:21 +0800
+ -- Gerrit Pape <pape@smarden.org> Fri, 10 Mar 2006 22:00:32 +0000
-dropbear (0.47-0.1) unstable; urgency=high
+dropbear (0.47-1) unstable; urgency=high
* New upstream release.
- * SECURITY: Fix incorrect buffer sizing.
+ * SECURITY: Fix incorrect buffer sizing; CVE-2005-4178.
-- Matt Johnston <matt@ucc.asn.au> Thu, 8 Dec 2005 19:20:21 +0800
diff --git a/debian/dropbear.README.Debian b/debian/dropbear.README.Debian
index 8cdac38..7eec3e6 100644
--- a/debian/dropbear.README.Debian
+++ b/debian/dropbear.README.Debian
@@ -39,3 +39,14 @@ by following these steps:
See the Dropbear homepage for more information:
http://matt.ucc.asn.au/dropbear/dropbear.html
+
+Entropy from /dev/random
+------------------------
+
+The dropbear binary package is configured at compile time to read
+entropy from /dev/random. If /dev/random on a system blocks when
+reading data from it, client logins may be delayed until the client
+times out. The dropbear server writes a notice to the logs when it
+sees /dev/random blocking. A workaround for such systems is to
+re-compile the package with DROPBEAR_RANDOM_DEV set to /dev/urandom
+in options.h.
diff --git a/debian/implicit b/debian/implicit
index 57a444a..7a7ee98 100644
--- a/debian/implicit
+++ b/debian/implicit
@@ -1,4 +1,4 @@
-# $Id: implicit,v 1.10 2004/07/03 15:20:00 pape Exp $
+# $Id: implicit,v 1.11 2005/11/29 21:57:55 pape Exp $
.PHONY: deb-checkdir deb-checkuid
@@ -38,6 +38,14 @@ deb-checkuid:
@gzip -9 debian/$*/usr/share/doc/$*/changelog*
%.deb-docs-docs:
@for i in `cat debian/$*.docs 2>/dev/null || :`; do \
+ if test -d $$i; then \
+ sh -cx "install -d -m0755 debian/$*/usr/share/doc/$*/$${i##*/}" && \
+ for j in $$i/*; do \
+ sh -cx "install -m0644 $$j \
+ debian/$*/usr/share/doc/$*/$${i##*/}/" || exit 1; \
+ done || exit 1; \
+ continue; \
+ fi; \
sh -cx "install -m0644 $$i debian/$*/usr/share/doc/$*/" || exit 1; \
done
@test ! -r debian/$*.README.Debian || \