News for package das-watchdog

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 3.0 (quilt)
Source: das-watchdog
Binary: das-watchdog
Architecture: any
Version: 0.9.0-2+deb7u1
Maintainer: Debian Multimedia Maintainers <[email protected]>
Uploaders: Free Ekanayaka <[email protected]>, Alessio Treglia <[email protected]>
Standards-Version: 3.9.0
Vcs-Browser: http://git.debian.org/?p=pkg-multimedia/das-watchdog.git
Vcs-Git: git://git.debian.org/pkg-multimedia/das-watchdog.git
Build-Depends: debhelper (>= 7.0.50~), libgtop2-dev, x11-utils
Package-List: 
 das-watchdog deb admin extra
Checksums-Sha1: 
 3d4bb6f71963fe79144875340dd1864558b8a128 8796 das-watchdog_0.9.0.orig.tar.gz
 1652a999aed6f3ca8a3c2e8baac283c80ed58e15 4965 das-watchdog_0.9.0-2+deb7u1.debian.tar.gz
Checksums-Sha256: 
 118393ae83d47a6f6db91910593c17aa041bb51feee4519d00b90780f6093f18 8796 das-watchdog_0.9.0.orig.tar.gz
 3c061d6ab42659135244f9b39101b14909d1e716e67e7546a6fe7403f27e7749 4965 das-watchdog_0.9.0-2+deb7u1.debian.tar.gz
Files: 
 1394e3457ca1599382fd821646c0e8e8 8796 das-watchdog_0.9.0.orig.tar.gz
 9c884b5fa18c2bdf9d9132cb7340470b 4965 das-watchdog_0.9.0-2+deb7u1.debian.tar.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=EJAy
-----END PGP SIGNATURE-----

Changes:
das-watchdog (0.9.0-2+deb7u1) wheezy-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Fix buffer overflow in the handling of the XAUTHORITY env variable
    (CVE-2015-2831) (Closes: #781806)
  * Remove duplicate check for temp[i] == '\0' in das_watchdog.c
  * Fix infinite loop on platforms where char is unsigned
  * Add fix-memory-leak-on-realloc.patch patch.
    Fix potential memory leak on realloc and causing "NULL+i" (write)
    dereference afterwards.
    Thanks to Niels Thykier <[email protected]>

 -- Salvatore Bonaccorso <[email protected]>  Sun, 12 Apr 2015 11:02:08 +0200