-
dosbox (0.74-2-3+deb10u1build0.19.04.1) disco-security; urgency=medium
* fake sync from Debian
dosbox (0.74-2-3+deb10u1) buster-security; urgency=medium
* Apply upstream fixes for two security issues:
- CVE-2019-7165: long lines in batch files would overflow the parsing
buffer;
- CVE-2019-12594: programs running inside DOSBox could access /proc.
along with a number of buffer overrun fixes. Closes: #931222.
-- Steve Beattie <email address hidden> Mon, 15 Jul 2019 13:01:47 -0700
-
dosbox (0.74-2-3) unstable; urgency=medium
* Enable the debugger and provide it in a separate dosbox-debug
package.
* Add a number of spelling fixes.
* Update debian/copyright.
* Standards-Version 4.3.0, no change required.
-- Stephen Kitt <email address hidden> Tue, 22 Jan 2019 18:33:26 +0100
-
dosbox (0.74-2-2) unstable; urgency=medium
[ Ondřej Nový ]
* d/watch: Use https protocol
[ Stephen Kitt ]
* Apply upstream fix to allow grabbing the mouse again with recent
X.org. Closes: #907271.
-- Stephen Kitt <email address hidden> Sun, 23 Dec 2018 21:30:44 +0100
-
dosbox (0.74-2-1) unstable; urgency=medium
* New upstream bug-fix release, obsoleting
ftbfs624976_upstream_svn3691.patch, fix-ftbfs-format-security.patch,
wine-move-z-mount-svn3736.patch, and
wine-style-namemangling-svn3742.patch.
* Adopt the package. Closes: #876772.
* Allow hyphens in versions.
* Point to the Salsa repository.
* Switch to debhelper compatibility level 11.
* Set “Rules-Requires-Root: no”.
* Clean up whitespace and the package description.
* Standards-Version 4.2.1, no further change required.
-- Stephen Kitt <email address hidden> Tue, 11 Sep 2018 09:15:15 +0200