Change log for cpio package in Ubuntu

7690 of 90 results
Superseded in edgy-release
cpio (2.6-16) unstable; urgency=low

  * Use correct path for rmt.  closes: #293632.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Mon,  10 Jul 2006 12:32:10 +0100
Superseded in edgy-release
cpio (2.6-15) unstable; urgency=high

  * Don't fail the preinst if the symlink doesn't exist.

 -- Adam Conrad <adconrad@0c3.net>   Thu,  29 Jun 2006 16:01:57 +0100
Superseded in edgy-release
cpio (2.6-14) unstable; urgency=low

  * Fix prerm to remove the correct info file. 
  * Clean up /usr/doc/cpio symlink in postinst
    (fix for #322778 was accidentally removed).
    closes: #375727.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Thu,  29 Jun 2006 10:53:07 +0100
Superseded in edgy-release
cpio (2.6-13) unstable; urgency=high

  * Updated German program translation from Holger Wansing.
    closes: #373942.
  * Patch from Holger Wansing to update the FSF address in
    cpio.pot.
  * Fix postinst to install the correct info file.  closes: #374143.
  * Add "Plural-Forms" to Danish .po.
  * Add build-dependency on gettext, and generate all .gmos at
    build time.

 -- Ubuntu Archive Auto-Sync <email address hidden>   Mon,  19 Jun 2006 10:26:29 +0100
Superseded in edgy-release
cpio (2.6-12) unstable; urgency=low

  * Updated Danish program translation from Claus Hindsgaul.
    closes: #359212.
  * Bump Standards-Version to 3.7.2.
  * Add watch file.

Obsolete in breezy-security
cpio (2.5-1.2ubuntu1.1) breezy-security; urgency=low


  * SECURITY UPDATE: Local buffer overflow.
  * copyout.c, write_out_header(): Check for and abort on ascii_header buffer
    overflow that occurs with extreme values of file properties (like file
    sizes).
  * CVE-2005-4268

 -- Martin Pitt <email address hidden>  Mon,  2 Jan 2006 17:59:57 +0000
Obsolete in hoary-security
cpio (2.5-1.1ubuntu1.2) hoary-security; urgency=low


  * SECURITY UPDATE: Local buffer overflow.
  * copyout.c, write_out_header(): Check for and abort on ascii_header buffer
    overflow that occurs with extreme values of file properties (like file
    sizes).
  * CVE-2005-4268

 -- Martin Pitt <email address hidden>  Mon,  2 Jan 2006 18:09:59 +0000
Obsolete in warty-security
cpio (2.5-1.1ubuntu0.3) warty-security; urgency=low


  * SECURITY UPDATE: Local buffer overflow.
  * copyout.c, write_out_header(): Check for and abort on ascii_header buffer
    overflow that occurs with extreme values of file properties (like file
    sizes).
  * CVE-2005-4268

 -- Martin Pitt <email address hidden>  Mon,  2 Jan 2006 18:18:32 +0000
Superseded in edgy-release
Obsolete in dapper-release
Superseded in dapper-release
cpio (2.6-10) unstable; urgency=medium


  * Fix potential buffer overflow on 64-bit architectures.
    [CVE-2005-4268].  closes: #344134.

 -- Clint Adams <email address hidden>  Tue, 20 Dec 2005 12:44:50 -0500
Superseded in dapper-release
cpio (2.6-9) unstable; urgency=high


  * configure.ac, src/extern.h, src/global.c: actually fix
    the error with checksums on 64-bit platforms.

 -- Clint Adams <email address hidden>  Sun, 30 Oct 2005 17:14:08 -0500
Obsolete in breezy-release
cpio (2.5-1.2ubuntu1) breezy; urgency=low


  * SECURITY UPDATE: Modify permissions of arbitrary files, path traversal.
  * copyin.c, copypass.c: Use fchmod() and fchown() before closing the output
    file instead of chmod() and chown() after closing it. This avoids
    exploiting this race condition with a hardlink attach to chmod/chown
    arbitrary files. [CAN-2005-1111]
  * copyin.c: Separate out path sanitizing to safer_name_suffix(): Apart from
    leading slashes, filter out ".." components from output file names if
    --no-absolute-filenames is given, to avoid path traversal. [CAN-2005-1229]

 -- Martin Pitt <email address hidden>  Thu, 29 Sep 2005 12:04:52 +0200
Superseded in hoary-security
cpio (2.5-1.1ubuntu1.1) hoary-security; urgency=low


  * SECURITY UPDATE: Modify permissions of arbitrary files, path traversal.
  * copyin.c, copypass.c: Use fchmod() and fchown() before closing the output
    file instead of chmod() and chown() after closing it. This avoids
    exploiting this race condition with a hardlink attach to chmod/chown
    arbitrary files. [CAN-2005-1111]
  * copyin.c: Separate out path sanitizing to safer_name_suffix(): Apart from
    leading slashes, filter out ".." components from output file names if
    --no-absolute-filenames is given, to avoid path traversal. [CAN-2005-1229]

 -- Martin Pitt <email address hidden>  Thu, 29 Sep 2005 10:10:41 +0000
Obsolete in hoary-release
cpio (2.5-1.1ubuntu1) hoary; urgency=low


  * SECURITY UPDATE: Fix creation of world-writeable files.
  * main.c: Do not create output file with 0666 with -O <archive>, but respect
    the current umask. 
  * Thanks to Martin Schulze for the patch.
  * References:
    CAN-1999-1572

 -- Martin Pitt <email address hidden>  Fri,  4 Feb 2005 10:28:24 +0100
Superseded in warty-security
cpio (2.5-1.1ubuntu0.2) warty-security; urgency=low


  * SECURITY UPDATE: Modify permissions of arbitrary files, path traversal.
  * copyin.c, copypass.c: Use fchmod() and fchown() before closing the output
    file instead of chmod() and chown() after closing it. This avoids
    exploiting this race condition with a hardlink attach to chmod/chown
    arbitrary files. [CAN-2005-1111]
  * copyin.c: Separate out path sanitizing to safer_name_suffix(): Apart from
    leading slashes, filter out ".." components from output file names if
    --no-absolute-filenames is given, to avoid path traversal. [CAN-2005-1229]

 -- Martin Pitt <email address hidden>  Thu, 29 Sep 2005 10:14:48 +0000
Obsolete in warty-release
cpio (2.5-1.1) unstable; urgency=low


  * Non-maintainer upload according to the release manager's plan.
  * Fix LSB 1.3 non-compliance (Closes: Bug#184887).

 -- Roland Mas <email address hidden>  Sat, 23 Aug 2003 16:07:05 +0200
7690 of 90 results