diff options
author | Peter Korsgaard <peter@korsgaard.com> | 2014-02-19 21:46:01 +0100 |
---|---|---|
committer | Peter Korsgaard <peter@korsgaard.com> | 2014-02-19 21:46:01 +0100 |
commit | 171fb7aa0c60c394e3868216dac6725b380e41f2 (patch) | |
tree | 7cc43faa5f2adc7c268fc1fe8a01308a6308db2b /package/libv4l/libv4l-02-use-openat-when-available.patch | |
parent | ac99683578c938819679036980d907b5b52e4154 (diff) | |
download | buildroot-171fb7aa0c60c394e3868216dac6725b380e41f2.tar.gz buildroot-171fb7aa0c60c394e3868216dac6725b380e41f2.zip |
dropbear: bump version
Fixes a number of issues. From the changelog:
- Avoid getting stuck in a loop writing huge key files, reported by Bruno
Thomsen
- Avoid crash on exit due to cleaned up keys before last packets are sent,
debugged by Ronald Wahl
- Fix a race condition in rekeying where Dropbear would exit if it received a
still-in-flight packet after initiating rekeying. Reported by Oliver Metz.
This is a longstanding bug but is triggered more easily since 2013.57
- Ensure that generated RSA keys are always exactly the length
requested. Previously Dropbear always generated N+16 or N+15 bit keys.
Thanks to Unit 193
- Fix DROPBEAR_CLI_IMMEDIATE_AUTH mode which saves a network round trip if the
first public key succeeds. Still not enabled by default, needs more
compatibility testing with other implementations.
- Fix signal handlers so that errno is saved, thanks to Erik Ahlén for a patch
and Mark Wickham for independently spotting the same problem.
And at the same time get rid of the TIMEVAL_TO_TIMESPEC as dropbear provides a
fallback implementation if not available (and has done so since 2006).
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/libv4l/libv4l-02-use-openat-when-available.patch')
0 files changed, 0 insertions, 0 deletions