[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted netkit-telnet-ssl 0.17.24+0.1-7.1 (i386 source)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 31 Mar 2005 11:09:56 -1000
Source: netkit-telnet-ssl
Binary: telnet-ssl telnetd-ssl
Architecture: source i386
Version: 0.17.24+0.1-7.1
Distribution: unstable
Urgency: high
Maintainer: Ian Beckwith <ianb@nessie.mcc.ac.uk>
Changed-By: Joey Hess <joeyh@debian.org>
Description: 
 telnet-ssl - The telnet client with SSL encryption support
 telnetd-ssl - The telnet server with SSL encryption support
Closes: 302036
Changes: 
 netkit-telnet-ssl (0.17.24+0.1-7.1) unstable; urgency=HIGH
 .
   * NMU
   * telnet/telnet.cc: Fixed buffer overflow in the handling of the
     LINEMODE suboptions in telnet clients (CAN-2005-0469).
     Thanks Martin 'Joey' Schulze for the patch.
     Closes: #302036
Files: 
 ebbc0c2496235b2f14503e5481d16d0d 650 net extra netkit-telnet-ssl_0.17.24+0.1-7.1.dsc
 c4dfcad7ca74707a339d640c5aae837d 23425 net extra netkit-telnet-ssl_0.17.24+0.1-7.1.diff.gz
 5f874db3c13d63c0c3f510fec78485ff 81280 net extra telnet-ssl_0.17.24+0.1-7.1_i386.deb
 a76993b54f6b730513f4f1f7ae4a6287 52180 net extra telnetd-ssl_0.17.24+0.1-7.1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCTGiQ2tp5zXiKP0wRAvcsAJ4z0Hkx6YX1FaDd9zUlQNzKuKC6mACcDUft
INdKqvZEx5Hn736ILxPYMjU=
=r9lF
-----END PGP SIGNATURE-----


Accepted:
netkit-telnet-ssl_0.17.24+0.1-7.1.diff.gz
  to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-7.1.diff.gz
netkit-telnet-ssl_0.17.24+0.1-7.1.dsc
  to pool/main/n/netkit-telnet-ssl/netkit-telnet-ssl_0.17.24+0.1-7.1.dsc
telnet-ssl_0.17.24+0.1-7.1_i386.deb
  to pool/main/n/netkit-telnet-ssl/telnet-ssl_0.17.24+0.1-7.1_i386.deb
telnetd-ssl_0.17.24+0.1-7.1_i386.deb
  to pool/main/n/netkit-telnet-ssl/telnetd-ssl_0.17.24+0.1-7.1_i386.deb



Reply to: