-
mbedtls (2.8.0-1) unstable; urgency=medium
* New upstream release.
* debian/control:
- Bump standards version to 4.1.4.
- Set Rules-Requires-Root: no.
* debian/libmbedcrypto1.symbols:
- Add new symbols in 2.8.
* debian/patches:
- Refresh config patch.
- Drop 02_dhm-Fix-typo-in-RFC-5114-constants.patch - applied upstream.
* debian/rules:
- Use /usr/share/dpkg/architecture.mk to get DEB_HOST_MULTIARCH.
- Clean apidoc directory using debian/clean file.
-- James Cowgill <email address hidden> Mon, 09 Apr 2018 21:06:36 +0100
-
mbedtls (2.7.0-2) unstable; urgency=medium
* Upload to unstable.
* debian/patches/02_dhm-Fix-typo-in-RFC-5114-constants.patch:
- Add patch to fix typo in RFC 5114 constants.
-- James Cowgill <email address hidden> Thu, 15 Feb 2018 18:32:16 +0000
-
mbedtls (2.6.0-1) unstable; urgency=high
* New upstream version.
- Fixes possible authentication bypass if a peer supplies a certificate
chain with more than 8 intermediates. (Closes: #873557)
* debian/copyright:
- Update copyright dates.
- Use https Format URL.
* debian/control:
- Bump standards to 4.1.0 (no changes required).
- Use debhelper compat 10.
* debian/libmbedcrypto0.symbols:
- Add new symbols from 2.6.0.
* debian/patches:
- Refresh config patch.
- Drop all stubs patches - upstream reverted the ABI breakage.
-- James Cowgill <email address hidden> Tue, 29 Aug 2017 16:09:30 +0100
-
mbedtls (2.5.1-1ubuntu1) artful; urgency=medium
* SECURITY UPDATE: If optional authentication is configured, allows
remote attackers to bypass peer authentication via an X.509 certificate
chain with many intermediates. (LP: #1714640)
- debian/patches/CVE-2017-14032.patch, backport two upstream patches to
return and handle a new "fatal error" error code in case of long
certificate chains.
- CVE-2017-14032
-- James Cowgill <email address hidden> Wed, 06 Sep 2017 21:11:46 -0500