Change logs for mono source package in Stretch

  • mono (4.6.2.7+dfsg-1) unstable; urgency=medium
    
      * [4274265] Another DEB_HOST_ARCH_OS / DEB_BUILD_ARCH_OS
      * [b96315e] Handle 4->3 part version numbering difference in get-orig-source
      * [64c42ea] dfsg2 -> dfsg for orig tarball
      * [41bc4a8] Imported Upstream version 4.6.2.7+dfsg
    
     -- Jo Shields <email address hidden>  Thu, 15 Dec 2016 10:58:56 +0000
  • mono (4.6.1.3+dfsg-8) unstable; urgency=high
    
      * [aee388a] Remove dead PPC/boehm symbol
      * [85aa8b5] Move call to sn.exe to *after* cil-stringreplacer.exe.
        (Closes: #844082)
      * [faceb4d] Use DEB_HOST_ARCH not DEB_BUILD_ARCH. Apparently.
    
     -- Jo Shields <email address hidden>  Sat, 12 Nov 2016 21:34:51 +0000
  • mono (4.2.1.102+dfsg2-8) unstable; urgency=medium
    
      * [cf4937c] Fixes for ARM64 packages. Thanks to Matthias Klose
      * [ec6abc9] Further packaging fixes for ARM64 (Closes: 825497)
    
     -- Jo Shields <email address hidden>  Fri, 27 May 2016 10:46:30 +0100
  • mono (4.2.1.102+dfsg2-6) unstable; urgency=medium
    
      * [d2d5aeb] Don't remap all versions of Npgsql to 4.0.0.0.
      * [dc3f62a] Don't use unowned /usr/share/.mono for certs (Closes: #808308)
    
     -- Jo Shields <email address hidden>  Mon, 15 Feb 2016 15:09:36 +0000
  • mono (4.2.1.102+dfsg2-5) unstable; urgency=medium
    
      * [db6d214] Make XBuild assume TargetFrameworkVersion 4.5, if none specified
    
     -- Jo Shields <email address hidden>  Tue, 15 Dec 2015 10:47:33 +0000
  • mono (3.2.8+dfsg-10) unstable; urgency=high
    
    
      * [037e3b5] Mono's implementation of the SSL/TLS stack failed to check
        the order of the handshake messages. Which would allow various attacks on
        the protocol to succeed. ("SKIP-TLS" attack).
        (Closes: #780751, CVE-2015-2318)
      * [38d3725] Remove the client-side SSLv2 fallback. There's almost no SSLv3
        web site left so a v2 fallback is only extra code we do not need to carry
        forward. (Closes: #780751, CVE-2015-2320)
      * [00e66d6] Remove the EXPORT ciphers and related code path. That was still
        useful in 2003/2004 but the technical and legal landscape changed a lot
        since then. Removing the old, limited key size, cipher suites also allow
        removed additional parts of the code that deals with them.
        ("FREAK" attack) (Closes: #780751, CVE-2015-2319)
    
     -- Jo Shields <email address hidden>  Thu, 19 Mar 2015 10:30:24 +0000