libyang (0.16.105+really1.0-0+deb10u1) buster-security; urgency=high

  * Non-maintainer upload by the LTS team.
  * Backport Bullseye version of libyang to facilitate security update of frr.
  * Fix CVE-2019-20391, CVE-2019-20392, CVE-2019-20393, CVE-2019-20394,
    CVE-2019-20395, CVE-2019-20396, CVE-2019-20397, CVE-2019-20398.
    Multiple flaws were found in libyang, a parser toolkit for IETF YANG data
    modeling. Double frees, invalid memory access and Null pointer dereferences
    may cause a denial of service or potentially code execution.

 -- Markus Koschany <apo@debian.org>  Tue, 19 Sep 2023 17:53:50 +0200

libyang (0.16.105-1+deb10u1) buster; urgency=medium

  * Fix CVE-2019-19333 & CVE-2019-19334 (Closes: #946217)
  * Fix cache corruption crash (upstream bug 752)

 -- Ondřej Surý <ondrej@debian.org>  Tue, 12 May 2020 09:02:56 +0200

libyang (0.16.105-1) unstable; urgency=medium

  * upstream 0.16.105 (0.16-r3) release

 -- David Lamparter <equinox-debian@diac24.net>  Wed, 23 Jan 2019 01:32:43 +0100

libyang (0.16.52-2) unstable; urgency=medium

  * use correct DEB_HOST_GNU_TYPE to fix i386 build
  * mark non-libyang C++ symbols as optional (fixes build on several arch)
  * pull in 2 upstraem fixes to get build working on big-endian

 -- David Lamparter <equinox-debian@diac24.net>  Thu, 06 Dec 2018 13:33:08 +0100

libyang (0.16.52-1) unstable; urgency=medium

  * Initial release.
  * Closes: #913219

 -- David Lamparter <equinox-debian@diac24.net>  Sun, 18 Nov 2018 19:30:04 +0100
