Change log for cpio package in Ubuntu

175 of 87 results
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
cpio (2.15+dfsg-1ubuntu2) noble; urgency=high

  * No change rebuild for 64-bit time_t and frame pointers.

 -- Julian Andres Klode <email address hidden>  Mon, 08 Apr 2024 17:55:28 +0200
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
cpio (2.15+dfsg-1ubuntu1) noble; urgency=medium

  * d/prerm, d/postinst: fix path according to /usr movement (LP: #2052295)

 -- Miriam EspaƱa Acebal <email address hidden>  Fri, 02 Feb 2024 13:03:45 +0100
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
cpio (2.15+dfsg-1) unstable; urgency=medium

  * New upstream release
    Noteworthy changes in this release:
    - Fix operation of --no-absolute-filenames --make-directories 
    - Restore access and modification times of symlinks in copy-in
      and copy-pass modes.
  * Update debian/watch 
  * Move files to /usr
    Patch by Helmut Grohne <email address hidden>
    Closes: #1059756

 -- Anibal Monsalve Salazar <email address hidden>  Mon, 15 Jan 2024 20:38:45 +1100

Available diffs

Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
cpio (2.14+dfsg-1) unstable; urgency=medium

  * New upstream release
    Closes: #1049402
    Noteworthy changes in this release:
    - New option --ignore-dirnlink
      Valid in copy-out mode, it instructs cpio to ignore the actual number
      of links reported for each directory member and always store 2
      instead.
    - Changes in --reproducible option
      The --reproducible option implies --ignore-dirlink.  In other words,
      it is equivalent to --ignore-devno --ignore-dirnlink --renumber-inodes.
    - Use GNU ls algorithm for deciding timestamp format in -tv mode
    - Bugfixes
      - Fix cpio header verification.
      - Fix handling of device numbers on copy out.
      - Fix calculation of CRC in copy-out mode.
      - Rewrite the fix for CVE-2015-1197.
      - Fix combination of --create --append --directory.
      - Fix appending to archives bigger than 2G.
  * Update uploaders list
    Closes: #925021
  * Standards-Version: 4.6.2
  * Fix Path traversal vulnerability due to partial revert of fix for CVE-2015-1197
    Closes: #1059163
  * cpio-win32 is no longer needed
    Closes: #1059238

 -- Anibal Monsalve Salazar <email address hidden>  Fri, 22 Dec 2023 16:38:54 +1100

Available diffs

Superseded in noble-release
Published in mantic-release
Published in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
cpio (2.13+dfsg-7.1) unstable; urgency=medium

  * Non-maintainer upload.
  * Suggest libarchive-dev (Closes: #662718).
  * d/copyright: Convert to machine-readable format.
  * Fix CRC with new ASCII format when file > 2GB (Closes: #962188).

 -- Bastian Germann <email address hidden>  Wed, 14 Sep 2022 21:45:55 +0200

Available diffs

Obsolete in hirsute-updates
Obsolete in hirsute-security
cpio (2.13+dfsg-4ubuntu0.3) hirsute-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via crafted pattern file
    - debian/patches/CVE-2021-38185.patch: rewrite dynamic string support
      in src/copyin.c, src/copyout.c, src/copypass.c, src/dstring.c,
      src/dstring.h, src/util.c.
    - debian/patches/CVE-2021-38185.2.patch: don't call ds_resize in a loop
      in src/dstring.c.
    - debian/patches/CVE-2021-38185.3.patch: fix dynamic string
      reallocations in src/dstring.c.
    - CVE-2021-38185

 -- Marc Deslauriers <email address hidden>  Wed, 25 Aug 2021 06:50:47 -0400
Published in bionic-updates
Published in bionic-security
cpio (2.12+dfsg-6ubuntu0.18.04.4) bionic-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via crafted pattern file
    - debian/patches/CVE-2021-38185.patch: rewrite dynamic string support
      in src/copyin.c, src/copyout.c, src/copypass.c, src/dstring.c,
      src/dstring.h, src/util.c.
    - debian/patches/CVE-2021-38185.2.patch: don't call ds_resize in a loop
      in src/dstring.c.
    - debian/patches/CVE-2021-38185.3.patch: fix dynamic string
      reallocations in src/dstring.c.
    - CVE-2021-38185

 -- Marc Deslauriers <email address hidden>  Wed, 25 Aug 2021 06:53:46 -0400
Published in focal-updates
Published in focal-security
cpio (2.13+dfsg-2ubuntu0.3) focal-security; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via crafted pattern file
    - debian/patches/CVE-2021-38185.patch: rewrite dynamic string support
      in src/copyin.c, src/copyout.c, src/copypass.c, src/dstring.c,
      src/dstring.h, src/util.c.
    - debian/patches/CVE-2021-38185.2.patch: don't call ds_resize in a loop
      in src/dstring.c.
    - debian/patches/CVE-2021-38185.3.patch: fix dynamic string
      reallocations in src/dstring.c.
    - CVE-2021-38185

 -- Marc Deslauriers <email address hidden>  Wed, 25 Aug 2021 06:52:28 -0400
Superseded in jammy-release
Obsolete in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
cpio (2.13+dfsg-4ubuntu4) impish; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via crafted pattern file
    - debian/patches/CVE-2021-38185.patch: rewrite dynamic string support
      in src/copyin.c, src/copyout.c, src/copypass.c, src/dstring.c,
      src/dstring.h, src/util.c.
    - debian/patches/CVE-2021-38185.2.patch: don't call ds_resize in a loop
      in src/dstring.c.
    - debian/patches/CVE-2021-38185.3.patch: fix dynamic string
      reallocations in src/dstring.c.
    - CVE-2021-38185

 -- Marc Deslauriers <email address hidden>  Mon, 23 Aug 2021 07:56:42 -0400
Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
cpio (2.13+dfsg-7) unstable; urgency=medium

  [ Salvatore Bonaccorso ]
  * Fix dynamic string reallocations (Closes: #992192)

 -- Anibal Monsalve Salazar <email address hidden>  Sun, 22 Aug 2021 15:21:53 +1000
Superseded in impish-proposed
cpio (2.13+dfsg-4ubuntu3) impish; urgency=medium

  * Back out CVE-2021-381185 patches for now as they appear to be causing a
    regression when building the kernel
    - debian/patches/CVE-2021-38185.patch: disabled
    - debian/patches/CVE-2021-38185.2.patch: disabled

 -- Marc Deslauriers <email address hidden>  Mon, 16 Aug 2021 12:34:15 -0400
Superseded in impish-proposed
cpio (2.13+dfsg-4ubuntu2) impish; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via crafted pattern file
    - debian/patches/CVE-2021-38185.2.patch: don't call ds_resize in a loop
      in src/dstring.c.
    - CVE-2021-38185

 -- Juerg Haefliger <email address hidden>  Mon, 16 Aug 2021 09:19:47 +0000
Superseded in impish-proposed
cpio (2.13+dfsg-4ubuntu1) impish; urgency=medium

  * SECURITY UPDATE: arbitrary code execution via crafted pattern file
    - debian/patches/CVE-2021-38185.patch: rewrite dynamic string support
      in src/copyin.c, src/copyout.c, src/copypass.c, src/dstring.c,
      src/dstring.h, src/util.c.
    - CVE-2021-38185

 -- Marc Deslauriers <email address hidden>  Mon, 09 Aug 2021 13:39:44 -0400
Superseded in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
cpio (2.13+dfsg-4) unstable; urgency=medium

  * Source only upload to enable migration.
    Closes: #969660 

 -- Anibal Monsalve Salazar <email address hidden>  Thu, 17 Sep 2020 21:16:18 +1000

Available diffs

Superseded in hirsute-release
Obsolete in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
cpio (2.13+dfsg-3) unstable; urgency=medium

  * Fix FTBFS multiple definition of 'program_name'
    src/global.c: Remove superfluous declaration of program_name 
    Add patch 963304-remove-superfluous-declaration-of-program_name
    Closes: #963304

 -- Anibal Monsalve Salazar <email address hidden>  Tue, 07 Jul 2020 23:12:56 -0500

Available diffs

Superseded in groovy-release
Published in focal-release
Deleted in focal-proposed (Reason: moved to Release)
cpio (2.13+dfsg-2) unstable; urgency=medium

  * Fix a regression in handling of CVE-2015-1197 & --no-absolute-filenames by
    reverting part of an upstream commit. (Closes: #946267, #946469)
  * Add Vcs-Git and Vcs-Browser pointing to my personal Salsa repository (in
    lieu of anything at all).
  * Bump Standards-Version to 4.5.0.

 -- Chris Lamb <email address hidden>  Sat, 01 Feb 2020 14:11:00 +0100

Available diffs

Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
cpio (2.13+dfsg-1) unstable; urgency=medium

  * New upstream release.
  * Autoreconf using version 1.16.1 and update autoreconf.patch.
  * Update patches:
    - Drop patch for CVE-2016-2037; applied upstream.
    - Drop CVE-2015-1197.patch; now addressed upstream.
    - Modify doc/Makefile.am (vs. doc/Makefile.in) prior to autoreconfing vs.
      the generated doc/Makefile.in.
    - Refresh whitespace, etc. in patches via pq import/export.
  * debian/control:
    - Bump Standards-Version to 4.4.1
    - Drop misleading Vcs-{Git,Browser}.
    - Use HTTPS Homepage URI.
    - Specify Rules-Requires-Root: binary-targets.

 -- Chris Lamb <email address hidden>  Wed, 20 Nov 2019 13:33:36 -0500
Superseded in focal-release
Deleted in focal-proposed (Reason: moved to Release)
cpio (2.12+dfsg-9ubuntu1) focal; urgency=medium

  * SECURITY UPDATE: Improper input validation
    - debian/patches/CVE-2019-14866.patch: improve diagnostics,
      remove to_oct_or_error, adding new macro in
      src/copyout.c, src/extern.h, src/tar.c.
    - CVE-2019-14866

 -- <email address hidden> (Leonidas S. Barbosa)  Wed, 06 Nov 2019 13:53:33 -0300
Obsolete in eoan-updates
Obsolete in eoan-security
cpio (2.12+dfsg-9ubuntu0.1) eoan-security; urgency=medium

  * SECURITY UPDATE: Improper input validation
    - debian/patches/CVE-2019-14866.patch: improve diagnostics,
      remove to_oct_or_error, adding new macro in
      src/copyout.c, src/extern.h, src/tar.c.
    - CVE-2019-14866

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 05 Nov 2019 16:45:57 -0300
Superseded in bionic-updates
Superseded in bionic-security
cpio (2.12+dfsg-6ubuntu0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Improper input validation
    - debian/patches/CVE-2019-14866.patch: improve diagnostics,
      remove to_oct_or_error, adding new macro in
      src/copyout.c, src/extern.h, src/tar.c.
    - CVE-2019-14866

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 05 Nov 2019 15:09:06 -0300
Obsolete in disco-updates
Obsolete in disco-security
cpio (2.12+dfsg-6ubuntu0.19.04.1) disco-security; urgency=medium

  * SECURITY UPDATE: Improper input validation
    - debian/patches/CVE-2019-14866.patch: improve diagnostics,
      remove to_oct_or_error, adding new macro in
      src/copyout.c, src/extern.h, src/tar.c.
    - CVE-2019-14866

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 05 Nov 2019 15:45:30 -0300
Published in xenial-updates
Published in xenial-security
cpio (2.11+dfsg-5ubuntu1.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Improper input validation
    - debian/patches/CVE-2019-14866.patch: improve diagnostics,
      remove to_oct_or_error, adding new macro in
      src/copyout.c, src/extern.h, src/tar.c.
    - CVE-2019-14866

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 05 Nov 2019 13:40:47 -0300
Published in precise-updates
Published in precise-security
cpio (2.11-7ubuntu3.3) precise-security; urgency=medium

  * SECURITY UPDATE: Improper input validation
    - debian/patches/CVE-2019-14866.patch: improve diagnostics,
      remove to_oct_or_error, adding new macro in
      src/copyout.c, src/extern.h, src/tar.c.
    - CVE-2019-14866

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 05 Nov 2019 12:31:13 -0300
Superseded in focal-release
Obsolete in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
cpio (2.12+dfsg-9) unstable; urgency=medium

  * Reinstate the call to update-alternatives(1) that I didnt see in the prerm
    script. Thanks again to Ivo De Decker. (Closes: #926698)

 -- Chris Lamb <email address hidden>  Tue, 23 Apr 2019 16:29:37 +0100
Superseded in eoan-proposed
cpio (2.12+dfsg-8) unstable; urgency=medium

  * Drop symlink removal - it's been gone since 2001 anyway. Thanks, Ivo De
    Decker. (Closes: #926698)

 -- Chris Lamb <email address hidden>  Tue, 23 Apr 2019 13:15:20 +0100
Superseded in eoan-release
Obsolete in disco-release
Obsolete in cosmic-release
Published in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
cpio (2.12+dfsg-6) unstable; urgency=medium

  * Upload to unstable.
    - Update debian/gbp.conf.
  * Remove empty directories under usr/share/man.
  * debian/control: "Priority: extra" has been replaced with "Priority:
    optional".

 -- Chris Lamb <email address hidden>  Sat, 02 Dec 2017 09:27:39 +0000

Available diffs

Superseded in bionic-release
Obsolete in artful-release
Obsolete in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
cpio (2.11+dfsg-6) unstable; urgency=medium

  * Man page for "mt" describes how to "fast erase"
    Patch by Kees Cook
    Add fix.mt-erase.manpage.patch
    Closes: #770198
  * Backport "New options to create device and inode-independent
    archives." from cpio 2.12
    Patch by Chris Lamb
    Add reproducible.patch
    See #804063
  * Standards-Version: 3.9.8
  * Refresh patches

 -- Anibal Monsalve Salazar <email address hidden>  Tue, 29 Nov 2016 12:31:53 +0000
Published in trusty-updates
Published in trusty-security
cpio (2.11+dfsg-1ubuntu1.2) trusty-security; urgency=medium

  * SECURITY UPDATE: file overwrite via symlink attack
    - debian/patches/CVE-2015-1197.patch: don't write files over symlinks
      unless --extract-over-symlinks is used in doc/cpio.1, src/copyin.c,
      src/extern.h, src/global.c, src/main.c.
    - CVE-2015-1197
  * SECURITY UPDATE: out-of-bounds write
    - debian/patches/CVE-2016-2037.patch: make sure there is at least two
      bytes available in src/copyin.c, added comment to src/util.c.
    - CVE-2016-2037
  * debian/patches/fix-symlink-test.patch: fix date-sensitive test.

 -- Marc Deslauriers <email address hidden>  Thu, 18 Feb 2016 09:15:43 -0500
Obsolete in wily-updates
Obsolete in wily-security
cpio (2.11+dfsg-4.1ubuntu1.1) wily-security; urgency=medium

  * SECURITY UPDATE: out-of-bounds write
    - debian/patches/CVE-2016-2037.patch: make sure there is at least two
      bytes available in src/copyin.c, added comment to src/util.c.
    - CVE-2016-2037

 -- Marc Deslauriers <email address hidden>  Thu, 18 Feb 2016 09:12:03 -0500
Superseded in precise-updates
Superseded in precise-security
cpio (2.11-7ubuntu3.2) precise-security; urgency=medium

  * SECURITY UPDATE: file overwrite via symlink attack
    - debian/patches/CVE-2015-1197.patch: don't write files over symlinks
      unless --extract-over-symlinks is used in doc/cpio.1, src/copyin.c,
      src/extern.h, src/global.c, src/main.c.
    - CVE-2015-1197
  * SECURITY UPDATE: out-of-bounds write
    - debian/patches/CVE-2016-2037.patch: make sure there is at least two
      bytes available in src/copyin.c, added comment to src/util.c.
    - CVE-2016-2037
  * debian/patches/fix-symlink-test.patch: fix date-sensitive test.

 -- Marc Deslauriers <email address hidden>  Thu, 18 Feb 2016 09:19:26 -0500
Superseded in zesty-release
Obsolete in yakkety-release
Published in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
cpio (2.11+dfsg-5ubuntu1) xenial; urgency=medium

  * Resynchronise with Debian. Remaining changes:
    - Don't build a cpio-win32 package since mingw-w64 is in universe.

Superseded in xenial-release
Obsolete in wily-release
Obsolete in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
cpio (2.11+dfsg-4.1ubuntu1) vivid; urgency=medium

  * Resynchronise with Debian.  Remaining changes:
    - Don't build a cpio-win32 package since mingw-w64 is in universe.

Obsolete in lucid-updates
Obsolete in lucid-security
cpio (2.10-1ubuntu2.1) lucid-security; urgency=medium

  * SECURITY UPDATE: out of bounds write and other range issues
    - Origin: upstream git commits
        746f3ff670dcfcdd28fcc990e79cd6fccc7ae48d
        54d1c42ac2cb91389fca04a5018ad573e4ae265a
        58df4f1b44a1142bba500f980fd26806413b1728
        fd262d116c4564c1796be9be2799619cf7785d07
        f6a8a2cbd2d5ca40ea94900b55b845dd5ca87328
    - tests/testsuite: regenerate with autom4te to incorporate
      testsuite additions
    - CVE-2014-9112
  * SECURITY UPDATE: rmt client heap-based buffer overflow in the
    rmt_read__ function
    - lib/rtapelib.c: check for status too large
    - Origin: http://git.savannah.gnu.org/cgit/paxutils.git/diff/lib/rtapelib.c?id=9bc39283e4cc6ab9e5913ccbf766998eab4ff093
    - CVE-2010-0624
 -- Steve Beattie <email address hidden>   Tue, 06 Jan 2015 13:49:11 -0800
Superseded in precise-updates
Superseded in precise-security
cpio (2.11-7ubuntu3.1) precise-security; urgency=medium

  * SECURITY UPDATE: out of bounds write and other range issues
    - debian/patches/cpio-CVE-2014-9112.patch
    - debian/patches/cpio-CVE-2014-9112-testsuite.patch: regenerate
      testsuite to incorporate tests from previous patch
    - CVE-2014-9112
 -- Steve Beattie <email address hidden>   Wed, 07 Jan 2015 11:36:30 -0800
Superseded in trusty-updates
Superseded in trusty-security
cpio (2.11+dfsg-1ubuntu1.1) trusty-security; urgency=medium

  * SECURITY UPDATE: out of bounds write and other range issues
    - debian/patches/cpio-CVE-2014-9112.patch
    - debian/patches/cpio-CVE-2014-9112-testsuite.patch: regenerate
      testsuite to incorporate tests from previous patch
    - CVE-2014-9112
 -- Steve Beattie <email address hidden>   Wed, 07 Jan 2015 11:31:48 -0800
Obsolete in utopic-updates
Obsolete in utopic-security
cpio (2.11+dfsg-2ubuntu1.1) utopic-security; urgency=medium

  * SECURITY UPDATE: out of bounds write and other range issues
    - debian/patches/cpio-CVE-2014-9112.patch
    - debian/patches/cpio-CVE-2014-9112-testsuite.patch: regenerate
      testsuite to incorporate tests from previous patch
    - CVE-2014-9112
 -- Steve Beattie <email address hidden>   Tue, 06 Jan 2015 17:09:37 -0800
Superseded in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
cpio (2.11+dfsg-4ubuntu1) vivid; urgency=medium

  * Resynchronise with Debian.  Remaining changes:
    - Don't build a cpio-win32 package since mingw-w64 is in universe.

Superseded in vivid-release
Obsolete in utopic-release
Deleted in utopic-proposed (Reason: moved to release)
cpio (2.11+dfsg-2ubuntu1) utopic; urgency=medium

  * Resynchronise with Debian.  Remaining changes:
    - Don't build a cpio-win32 package since mingw-w64 is in universe.

Superseded in utopic-release
Published in trusty-release
Obsolete in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
cpio (2.11+dfsg-1ubuntu1) saucy; urgency=low

  * Resynchronise with Debian.  Remaining changes:
    - Don't build a cpio-win32 package since mingw32 is in universe.

Superseded in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
cpio (2.11+dfsg-0.2ubuntu1) saucy; urgency=low

  * Resynchronise with Debian.  Remaining changes:
    - Don't build a cpio-win32 package since mingw32 is in universe.

Superseded in saucy-release
Obsolete in raring-release
Deleted in raring-proposed (Reason: moved to release)
cpio (2.11+dfsg-0.1ubuntu1) raring; urgency=low

  * Resynchronise with Debian.  Remaining changes:
    - Don't build a cpio-win32 package since mingw32 is in universe.
    - Mark cpio Multi-Arch: foreign.
    - Update config.guess and config.sub for aarch64.
    - Fix build failure with glibc 2.16.

Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
cpio (2.11-8ubuntu5) raring; urgency=low

  * Revert build-dependency from gettext:any to gettext, now that gettext is
    Multi-Arch: foreign.
 -- Colin Watson <email address hidden>   Thu, 29 Nov 2012 15:00:49 +0000

Available diffs

Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
cpio (2.11-8ubuntu4) raring; urgency=low

  * Fix FTBFS with glibc-2.16 (due to outdated gnulib/gets removal;
    LP: #1079748).
 -- Wookey <email address hidden>   Fri, 16 Nov 2012 16:59:53 +0000

Available diffs

Superseded in raring-release
Obsolete in quantal-release
cpio (2.11-8ubuntu3) quantal; urgency=low

  * Update config.guess,sub for aarch64
 -- Wookey <email address hidden>   Mon, 01 Oct 2012 12:56:42 +0100

Available diffs

Superseded in quantal-release
cpio (2.11-8ubuntu2) quantal; urgency=low

  * Mark cpio Multi-Arch foreign, for cross-build-deps (closes: #678385)
 -- Adam Conrad <email address hidden>   Fri, 13 Jul 2012 21:32:41 -0600

Available diffs

Superseded in quantal-release
Deleted in quantal-proposed (Reason: moved to release)
cpio (2.11-8ubuntu1) quantal-proposed; urgency=low

  * Merge from Debian unstable, remaining changes:
    - debian/control: Don't build a cpio-win32 package since mingw32
      is in universe.
    - debian/rules: Don't depend on the binary-indep target in binary.
    - Build-depend on gettext:any instead of on gettext.
  * Dropped changes, included in Debian:
    - debian/patches/627444-cross-compiling.patch: fix cross-building
      support.
    - debian/rules: use the host-arch strip when cross-compiling, so we don't
      have to rely on support in binutils-multiarch.

Available diffs

Superseded in quantal-release
Published in precise-release
cpio (2.11-7ubuntu3) precise; urgency=low

  * debian/patches/627444-cross-compiling.patch: fix cross-building
    support.  Thanks to Steve McIntyre <email address hidden>.
    Closes: #627444.
  * debian/rules: use the host-arch strip when cross-compiling, so we don't
    have to rely on support in binutils-multiarch.
 -- Steve Langasek <email address hidden>   Sun, 01 Apr 2012 18:07:27 +0000

Available diffs

Superseded in precise-release
cpio (2.11-7ubuntu2) precise; urgency=low

  * Build-depend on gettext:any instead of on gettext, so that apt-get can
    properly resolve build-dependencies on the tool when cross-building.
 -- Steve Langasek <email address hidden>   Fri, 30 Mar 2012 17:16:41 +0000

Available diffs

Superseded in precise-release
Obsolete in oneiric-release
Obsolete in natty-release
cpio (2.11-7ubuntu1) natty; urgency=low

  * Merge from debian unstable (LP: #723742). Remaining changes:
    - debian/control: Don't build a cpio-win32 package since mingw32
      is in universe.
    - debian/rules: Don't depend on the binary-indep target in binary.

Available diffs

Superseded in natty-release
cpio (2.11-6ubuntu1) natty; urgency=low

  * Merge from debian unstable.  Remaining changes: (LP: #704421)
    - debian/control: Don't build a cpio-win32 package since mingw32
      is in universe.
    - debian/rules: Don't depend on the binary-indep target in binary.
 -- Artur Rona <email address hidden>   Tue, 18 Jan 2011 12:22:07 +0100

Available diffs

Superseded in natty-release
cpio (2.11-5ubuntu1) natty; urgency=low

  * Merge from debian unstable.  Remaining changes:
    - debian/control: Don't build a cpio-win32 package
    - debian/rules: don't depend on the binary-indep target in binary.

Available diffs

Superseded in natty-release
Obsolete in maverick-release
cpio (2.11-4ubuntu1) maverick; urgency=low

  * Merge from Debian unstable, remaining changes:
    - debian/control: Don't build a cpio-win32 package
    - debian/rules: don't depend on the binary-indep target in binary.
  * New upstream version fixes bug where directory permissions are dropped
    in passthrough mode.  LP: #214942.

Superseded in maverick-release
Obsolete in lucid-release
cpio (2.10-1ubuntu2) lucid; urgency=low

  * rebuild rest of main for armel armv7/thumb2 optimization;
    UbuntuSpec:mobile-lucid-arm-gcc-v7-thumb2
 -- Alexander Sack <email address hidden>   Fri, 05 Mar 2010 04:06:20 +0100
Superseded in lucid-release
Obsolete in karmic-release
cpio (2.10-1ubuntu1) karmic; urgency=low

  * Merge from debian unstable, remaining changes: LP: #390912
    -  debian/control: Don't build a cpio-win32 package (LP 229877).
    - debian/rules: don't depend on the binary-indep target in binary.

Available diffs

Superseded in karmic-release
cpio (2.9.90-3ubuntu1) karmic; urgency=low

  * Merge from debian unstable, remaining changes:
    - debian/control: Don't build a cpio-win32 package (LP 229877).
    - debian/rules: don't depend on the binary-indep target in binary.

Available diffs

Superseded in karmic-release
Obsolete in jaunty-release
cpio (2.9-15ubuntu1) jaunty; urgency=low

  * Merge from debian unstable, remaining changes:
    - debian/control: Don't build a cpio-win32 package (LP 229877).
    - debian/rules: don't depend on the binary-indep target in binary.

Available diffs

Superseded in jaunty-release
cpio (2.9-14ubuntu1) jaunty; urgency=low

  * Merge from debian unstable, remaining changes:
    - Don't build a cpio-win32 package (LP: #229877)
      - debian/control: Remove mingw32 from Build-Depends-Indep and the
      cpio-win32 stanza
      - debian/rules: don't depend on the binary-indep target in binary

Available diffs

Superseded in jaunty-release
Obsolete in intrepid-release
cpio (2.9-13ubuntu2) intrepid; urgency=low

  * Make sure that HAVE_GETPWNAM, HAVE_GETGRNAM, HAVE_GETPWUID and
    HAVE_GETGRGID are defined so that the real functions are used, rather
    than dummy ones. Having HAVE_GETPWNAM defined makes --owner work with
    user and group names again. (LP: #273259)
    - Also switch lib/system.h to use HAVE_GETPWUID instead of HAVE_PWUID.

 -- James Westby <email address hidden>   Thu, 25 Sep 2008 20:47:23 +0100

Available diffs

Obsolete in gutsy-updates
Obsolete in gutsy-security
cpio (2.8-1ubuntu2.2) gutsy-security; urgency=low

  * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
    cpio has unspecified attack vectors and impact, resulting in a "crashing
    stack."
  * patch paxnames.c to correct an allocation weakness in safer_name_suffix()
    which could lead to a crash. Thanks to Stephan Hermann
  * References:
    CVE-2007-4476
    LP: #161173

 -- Jamie Strandboge <email address hidden>   Mon, 29 Sep 2008 16:58:13 -0500

Available diffs

Obsolete in feisty-updates
Obsolete in feisty-security
cpio (2.6-17ubuntu0.7.04.1) feisty-security; urgency=low

  * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
    cpio has unspecified attack vectors and impact, resulting in a "crashing
    stack."
  * src/copyin.c: patch copyin.c to correct an allocation weakness in
    safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
  * References:
    CVE-2007-4476
    LP: #161173

 -- Jamie Strandboge <email address hidden>   Mon, 29 Sep 2008 16:58:13 -0500

Available diffs

Obsolete in dapper-updates
Obsolete in dapper-security
cpio (2.6-10ubuntu0.3) dapper-security; urgency=low

  * SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
    cpio has unspecified attack vectors and impact, resulting in a "crashing
    stack."
  * src/copyin.c: patch copyin.c to correct an allocation weakness in
    safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
  * References:
    CVE-2007-4476
    LP: #161173

 -- Jamie Strandboge <email address hidden>   Mon, 29 Sep 2008 16:58:13 -0500

Available diffs

Superseded in intrepid-release
cpio (2.9-13ubuntu1) intrepid; urgency=low

  * Don't build a cpio-win32 package (LP: #229877):
    * debian/control: Remove mingw32 from Build-Depends-Indep and the
      cpio-win32 stanza
    * debian/rules: don't depend on the binary-indep target in binary
  * debian/control:
    * Modify Maintainer value to match DebianMaintainerField spec.

 -- Michael Bienia <email address hidden>   Tue, 13 May 2008 11:50:19 +0200
Superseded in intrepid-release
cpio (2.9-13) unstable; urgency=low

  * Remove pre-sarge fixup from postinst, and remove preinst entirely.

Superseded in intrepid-release
Obsolete in hardy-release
cpio (2.9-6ubuntu1) hardy; urgency=low

  * Merge from debian unstable, remaining changes:
    - Build with -fgnu89-inline to build with gcc-4.3
    - Set Ubuntu maintainer address.

Superseded in hardy-release
Obsolete in gutsy-release
cpio (2.8-1ubuntu2) gutsy; urgency=low

  * src/copyin.c: Applied patch from Dave Gilbert inline to fix
    possible segfault when fixing headers, where the magic number
    is byte swapped (LP: #139928)

 -- dAniel hAhler <email address hidden>   Tue, 02 Oct 2007 04:54:51 +0200
Superseded in gutsy-release
cpio (2.8-1ubuntu1) gutsy; urgency=low

  * Build with -fgnu89-inline to build with gcc-4.3. LP: #138566.
  * Set Ubuntu maintainer address.

 -- Matthias Klose <email address hidden>   Wed, 12 Sep 2007 20:02:12 +0000
Superseded in gutsy-release
cpio (2.8-1) unstable; urgency=low

  * New upstream release.
    - Includes updated nl.po.  closes: #427375.
  * Move package from Arch to git and add XS-VCS-Git and XS-VCS-Browser
    to debian/control.

Superseded in gutsy-release
cpio (2.7-3) unstable; urgency=low

  * Apply upstream patches:
    - (long_format): Use PRIuMAX for printing file size
    - (from_ascii): Bugfix: allow for empty fields.  closes: #425532.
    - (process_copy_out): Fix memory leaks on orig_file_name.
    - (process_copy_pass): symlink_error takes two arguments.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Wed,  23 May 2007 06:26:30 +0100
Superseded in gutsy-release
cpio (2.7-2) unstable; urgency=medium

  * Apply patch from Russell Stuart to fix some malformed
    creation of ustar archives.  closes: #358990. 

Superseded in dapper-updates
cpio (2.6-10ubuntu0.2) dapper-updates; urgency=low

  * Upload to dapper-updates.
  (Closes Ubuntu: #59228)

  * Change tested by Fabio M. Di Nitto and Simon Law with logs and data of
    the tests available in the bug report.

 -- Fabio M. Di Nitto <email address hidden>   Fri, 06 Oct 2006 10:52:10 +0200
Deleted in dapper-proposed (Reason: moved to -updates)
cpio (2.6-10ubuntu0.1) dapper-proposed; urgency=low

  * Fix setlocale glitch.
  (Closes Ubuntu: #59228)

 -- Fabio M. Di Nitto <email address hidden>   Fri, 29 Sep 2006 09:33:55 +0200
Superseded in gutsy-release
Obsolete in feisty-release
Obsolete in edgy-release
cpio (2.6-17) unstable; urgency=high

  * Fix setlocale glitch.  closes: #381348.

 -- Fabio Massimo Di Nitto <email address hidden>   Fri,  29 Sep 2006 10:10:55 +0100
Superseded in edgy-release
cpio (2.6-16) unstable; urgency=low

  * Use correct path for rmt.  closes: #293632.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Mon,  10 Jul 2006 12:32:10 +0100
Superseded in edgy-release
cpio (2.6-15) unstable; urgency=high

  * Don't fail the preinst if the symlink doesn't exist.

 -- Adam Conrad <adconrad@0c3.net>   Thu,  29 Jun 2006 16:01:57 +0100
Superseded in edgy-release
cpio (2.6-14) unstable; urgency=low

  * Fix prerm to remove the correct info file. 
  * Clean up /usr/doc/cpio symlink in postinst
    (fix for #322778 was accidentally removed).
    closes: #375727.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Thu,  29 Jun 2006 10:53:07 +0100
175 of 87 results