diff --git a/debian/changelog b/debian/changelog
index 249cdff2895e4da3c184128a2fcc7cc3c30073d9..46616309b836ec1c50e18bf53db68b9d44b1981a 100644 (file)
--- a/debian/changelog
+++ b/debian/changelog
+collectd (5.6.0-1) UNRELEASED; urgency=medium
+
+ * New upstream release.
+ - The disk plugin now supports FreeBSD; enable it in debian/rules.
+
+ -- Sebastian Harl <tokkee@debian.org> Sat, 24 Sep 2016 11:59:37 +0200
+
+collectd (5.5.2-2) unstable; urgency=low
+
+ * debian/changelog:
+ - Set urgency back to low.
+ * debian/control:
+ - Update GCrypt's package name to libgcrypt20-dev.
+ * debian/patches:
+ - Added configure_find_lc_all.patch: forcing locale in configure script
+ will hopefully fix build reproducibility on non-amd64 plafroms.
+
+ -- Marc Fournier <marc@bl.uem.li> Wed, 21 Sep 2016 14:01:55 +0200
+
+collectd (5.5.2-1) unstable; urgency=high
+
+ * New upstream release.
+ - Fix heap overflow in the network plugin. Emilien Gaspar has identified a
+ heap overflow in parse_packet(), the function used by the network plugin
+ to parse incoming network packets. Thanks to Florian Forster for
+ reporting the bug in Debian. (Closes: #832507, CVE-2016-6254)
+ - Fix improper usage of gcry_control. A team of security researchers at
+ Columbia University and the University of Virginia discovered that
+ GCrypt's gcry_control is sometimes called without checking its return
+ value for an error. This may cause the program to be initialized without
+ the desired, secure settings. (Closes: #832577)
+ * debian/patches:
+ - bts832577-gcry-control.patch: Update for 5.5.2. Mostly part of the new
+ upstream release, except for: Don't abort() if gcrypt initialization
+ failed.
+ - Drop bts823012_librrd8.patch; merged upstream.
+ * Rebuild with linux-libc-dev >= 4.6 (now in testing and unstable) to
+ accommodate a change to rtnl_link_stats64. Thanks to Gábor Gombás for
+ reporting this (Closes: #829634).
+
+ -- Sebastian Harl <tokkee@debian.org> Fri, 29 Jul 2016 00:02:11 +0200
+
collectd (5.5.1-5) unstable; urgency=low
* debian/control, debian/rules:
-- Marc Fournier <marc.fournier@camptocamp.com> Fri, 21 Aug 2015 13:29:17 +0200
+collectd (5.4.1-6+deb8u1) jessie-security; urgency=high
+
+ * debian/patches/CVE-2016-6254.dpatch: Fix heap overflow in the network
+ plugin. Emilien Gaspar has identified a heap overflow in parse_packet(),
+ the function used by the network plugin to parse incoming network packets.
+ Thanks to Florian Forster for reporting the bug in Debian.
+ (Closes: #832507, CVE-2016-6254)
+ * debian/patches/bts832577-gcry-control.dpatch: Fix improper usage of
+ gcry_control. A team of security researchers at Columbia University and
+ the University of Virginia discovered that GCrypt's gcry_control is
+ sometimes called without checking its return value for an error. This may
+ cause the program to be initialized without the desired, secure settings.
+ (Closes: #832577)
+
+ -- Sebastian Harl <tokkee@debian.org> Thu, 28 Jul 2016 22:25:08 +0200
+
collectd (5.4.1-6) unstable; urgency=medium
* debian/patches:
-- gregor herrmann <gregoa@debian.org> Sun, 26 May 2013 00:52:37 +0200
+collectd (5.1.0-3+deb7u1) wheezy-security; urgency=high
+
+ * debian/patches/CVE-2016-6254.dpatch: Fix heap overflow in the network
+ plugin. Emilien Gaspar has identified a heap overflow in parse_packet(),
+ the function used by the network plugin to parse incoming network packets.
+ Thanks to Florian Forster for reporting the bug in Debian.
+ (Closes: #832507, CVE-2016-6254)
+ * debian/patches/bts832577-gcry-control.dpatch: Fix improper usage of
+ gcry_control. A team of security researchers at Columbia University and
+ the University of Virginia discovered that GCrypt's gcry_control is
+ sometimes called without checking its return value for an error. This may
+ cause the program to be initialized without the desired, secure settings.
+ (Closes: #832577)
+
+ -- Sebastian Harl <tokkee@debian.org> Thu, 28 Jul 2016 20:52:12 +0200
+
collectd (5.1.0-3) unstable; urgency=low
* debian/patches/migrate-4-5-df.dpatch, debian/collectd-core.postinst: