| Age | Commit message (Collapse) | Author | |
|---|---|---|---|
| 2015-05-06 | debian/patches/CVE-2014-3675.patch, debian/patches/CVE-2014-3677.patch, | Mathieu Trudel-Lapierre | |
| debian/patches/0001-Update-openssl-to-0.9.8za.patch: dropped, included in the upstream release. | |||
| 2014-10-08 | * SECURITY UPDATE: heap overflow and out-of-bounds read access when | Steve Langasek | |
| parsing DHCPv6 information - debian/patches/CVE-2014-3675.patch: apply proper bounds checking when parsing data provided in DHCPv6 packets. - CVE-2014-3675 - CVE-2014-3676 * SECURITY UPDATE: memory corruption when processing user-provided key lists - debian/patches/CVE-2014-3677.patch: detect malformed machine owner key (MOK) lists and ignore them, avoiding possible memory corruption. - CVE-2014-3677 | |||
