Change log for ntfs-3g package in Ubuntu
1 → 75 of 114 results | First • Previous • Next • Last |
Published in oracular-release |
Published in noble-release |
Deleted in noble-proposed (Reason: Moved to noble) |
ntfs-3g (1:2022.10.3-1.2ubuntu3) noble; urgency=high * No change rebuild against libgnutls30t64. -- Julian Andres Klode <email address hidden> Mon, 08 Apr 2024 16:46:29 +0200
Available diffs
ntfs-3g (1:2022.10.3-1.2ubuntu2) noble; urgency=medium * No-change rebuild for CVE-2024-3094 -- Steve Langasek <email address hidden> Sun, 31 Mar 2024 08:10:22 +0000
Available diffs
ntfs-3g (1:2022.10.3-1.2ubuntu1) noble; urgency=medium * Merge with Debian unstable. Remaining changes: - d/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root.
Available diffs
Superseded in noble-proposed |
ntfs-3g (1:2022.10.3-1.1ubuntu1) noble; urgency=medium * Merge with Debian unstable. Remaining changes: - d/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root.
Available diffs
Deleted in noble-updates (Reason: superseded by release) |
Superseded in noble-release |
Published in mantic-release |
Published in lunar-release |
Deleted in lunar-proposed (Reason: Moved to lunar) |
ntfs-3g (1:2022.10.3-1ubuntu1) lunar; urgency=medium * Merge with Debian unstable. Remaining changes: - debian/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root. -- Dan Bungert <email address hidden> Tue, 14 Feb 2023 12:47:55 -0700
Available diffs
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.5) bionic-security; urgency=medium * SECURITY UPDATE: code execution via incorrect validation of metadata - debian/patches/CVE-2022-40284-1.patch: rejected zero-sized runs in libntfs-3g/runlist.c. - debian/patches/CVE-2022-40284-2.patch: avoided merging runlists with no runs in libntfs-3g/runlist.c. - CVE-2022-40284 -- Marc Deslauriers <email address hidden> Tue, 01 Nov 2022 07:57:16 -0400
Available diffs
ntfs-3g (1:2017.3.23AR.3-3ubuntu1.3) focal-security; urgency=medium * SECURITY UPDATE: code execution via incorrect validation of metadata - debian/patches/CVE-2022-40284-1.patch: rejected zero-sized runs in libntfs-3g/runlist.c. - debian/patches/CVE-2022-40284-2.patch: avoided merging runlists with no runs in libntfs-3g/runlist.c. - CVE-2022-40284 -- Marc Deslauriers <email address hidden> Tue, 01 Nov 2022 07:56:50 -0400
Available diffs
ntfs-3g (1:2021.8.22-3ubuntu1.2) jammy-security; urgency=medium * SECURITY UPDATE: code execution via incorrect validation of metadata - debian/patches/CVE-2022-40284-1.patch: rejected zero-sized runs in libntfs-3g/runlist.c. - debian/patches/CVE-2022-40284-2.patch: avoided merging runlists with no runs in libntfs-3g/runlist.c. - CVE-2022-40284 -- Marc Deslauriers <email address hidden> Tue, 01 Nov 2022 07:56:19 -0400
Available diffs
Superseded in lunar-release |
Deleted in lunar-proposed (Reason: Moved to lunar) |
Obsolete in kinetic-updates |
Obsolete in kinetic-security |
ntfs-3g (1:2022.5.17-1ubuntu1.1) kinetic-security; urgency=medium * SECURITY UPDATE: code execution via incorrect validation of metadata - debian/patches/CVE-2022-40284-1.patch: rejected zero-sized runs in libntfs-3g/runlist.c. - debian/patches/CVE-2022-40284-2.patch: avoided merging runlists with no runs in libntfs-3g/runlist.c. - CVE-2022-40284 -- Marc Deslauriers <email address hidden> Tue, 01 Nov 2022 07:53:35 -0400
Available diffs
Superseded in lunar-release |
Obsolete in kinetic-release |
Deleted in kinetic-proposed (Reason: Moved to kinetic) |
ntfs-3g (1:2022.5.17-1ubuntu1) kinetic; urgency=medium * Merge with Debian unstable. Remaining changes: - debian/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root. - debian/control: don't Build-Depends on libfuse-dev since the package is built using the --with-fuse=internal option, switch to fuse3.
Available diffs
ntfs-3g (1:2017.3.23AR.3-3ubuntu1.2) focal-security; urgency=medium * SECURITY UPDATE: heap buffer overflow in ntfsck - debian/patches/CVE-2021-46790.patch: properly handle error in ntfsprogs/ntfsck.c. - CVE-2021-46790 * SECURITY UPDATE: traffic interception via incorrect return code - debian/patches/CVE-2022-30783.patch: return proper error code in libfuse-lite/mount.c, src/ntfs-3g_common.c, src/ntfs-3g_common.h. - CVE-2022-30783 * SECURITY UPDATE: heap exhaustion via invalid NTFS image - debian/patches/CVE-2022-30784.patch: Avoid allocating and reading an attribute beyond its full size in libntfs-3g/attrib.c. - CVE-2022-30784 * SECURITY UPDATE: arbitrary memory access via fuse - debian/patches/CVE-2022-30785_30787.patch: check directory offset in libfuse-lite/fuse.c. - CVE-2022-30785 - CVE-2022-30787 * SECURITY UPDATE: heap overflow via ntfs attribute names - debian/patches/CVE-2022-30786-1.patch: make sure there is no null character in an attribute name in libntfs-3g/attrib.c. - debian/patches/CVE-2022-30786-2.patch: make sure there is no null character in an attribute name in libntfs-3g/attrib.c. - CVE-2022-30786 * SECURITY UPDATE: heap buffer overflow via crafted NTFS image - debian/patches/CVE-2022-30788-1.patch: use a default usn when the former one cannot be retrieved in libntfs-3g/mft.c. - debian/patches/CVE-2022-30788-2.patch: fix operation on little endian data in libntfs-3g/mft.c. - CVE-2022-30788 * SECURITY UPDATE: heap buffer overflow via crafted NTFS image - debian/patches/CVE-2022-30789.patch: make sure the client log data does not overflow from restart page in libntfs-3g/logfile.c. - CVE-2022-30789 -- Marc Deslauriers <email address hidden> Mon, 06 Jun 2022 14:09:42 -0400
ntfs-3g (1:2021.8.22-3ubuntu1.1) jammy-security; urgency=medium * SECURITY UPDATE: heap buffer overflow in ntfsck - debian/patches/CVE-2021-46790.patch: properly handle error in ntfsprogs/ntfsck.c. - CVE-2021-46790 * SECURITY UPDATE: traffic interception via incorrect return code - debian/patches/CVE-2022-30783.patch: return proper error code in libfuse-lite/mount.c, src/ntfs-3g_common.c, src/ntfs-3g_common.h. - CVE-2022-30783 * SECURITY UPDATE: heap exhaustion via invalid NTFS image - debian/patches/CVE-2022-30784.patch: Avoid allocating and reading an attribute beyond its full size in libntfs-3g/attrib.c. - CVE-2022-30784 * SECURITY UPDATE: arbitrary memory access via fuse - debian/patches/CVE-2022-30785_30787.patch: check directory offset in libfuse-lite/fuse.c. - CVE-2022-30785 - CVE-2022-30787 * SECURITY UPDATE: heap overflow via ntfs attribute names - debian/patches/CVE-2022-30786-1.patch: make sure there is no null character in an attribute name in libntfs-3g/attrib.c. - debian/patches/CVE-2022-30786-2.patch: make sure there is no null character in an attribute name in libntfs-3g/attrib.c. - CVE-2022-30786 * SECURITY UPDATE: heap buffer overflow via crafted NTFS image - debian/patches/CVE-2022-30788-1.patch: use a default usn when the former one cannot be retrieved in libntfs-3g/mft.c. - debian/patches/CVE-2022-30788-2.patch: fix operation on little endian data in libntfs-3g/mft.c. - CVE-2022-30788 * SECURITY UPDATE: heap buffer overflow via crafted NTFS image - debian/patches/CVE-2022-30789.patch: make sure the client log data does not overflow from restart page in libntfs-3g/logfile.c. - CVE-2022-30789 -- Marc Deslauriers <email address hidden> Mon, 06 Jun 2022 13:57:00 -0400
Available diffs
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.4) bionic-security; urgency=medium * SECURITY UPDATE: heap buffer overflow in ntfsck - debian/patches/CVE-2021-46790.patch: properly handle error in ntfsprogs/ntfsck.c. - CVE-2021-46790 * SECURITY UPDATE: traffic interception via incorrect return code - debian/patches/CVE-2022-30783.patch: return proper error code in libfuse-lite/mount.c, src/ntfs-3g_common.c, src/ntfs-3g_common.h. - CVE-2022-30783 * SECURITY UPDATE: heap exhaustion via invalid NTFS image - debian/patches/CVE-2022-30784.patch: Avoid allocating and reading an attribute beyond its full size in libntfs-3g/attrib.c. - CVE-2022-30784 * SECURITY UPDATE: arbitrary memory access via fuse - debian/patches/CVE-2022-30785_30787.patch: check directory offset in libfuse-lite/fuse.c. - CVE-2022-30785 - CVE-2022-30787 * SECURITY UPDATE: heap overflow via ntfs attribute names - debian/patches/CVE-2022-30786-1.patch: make sure there is no null character in an attribute name in libntfs-3g/attrib.c. - debian/patches/CVE-2022-30786-2.patch: make sure there is no null character in an attribute name in libntfs-3g/attrib.c. - CVE-2022-30786 * SECURITY UPDATE: heap buffer overflow via crafted NTFS image - debian/patches/CVE-2022-30788-1.patch: use a default usn when the former one cannot be retrieved in libntfs-3g/mft.c. - debian/patches/CVE-2022-30788-2.patch: fix operation on little endian data in libntfs-3g/mft.c. - CVE-2022-30788 * SECURITY UPDATE: heap buffer overflow via crafted NTFS image - debian/patches/CVE-2022-30789.patch: make sure the client log data does not overflow from restart page in libntfs-3g/logfile.c. - CVE-2022-30789 -- Marc Deslauriers <email address hidden> Mon, 06 Jun 2022 14:11:22 -0400
ntfs-3g (1:2017.3.23AR.3-3ubuntu5.1) impish-security; urgency=medium * SECURITY UPDATE: heap buffer overflow in ntfsck - debian/patches/CVE-2021-46790.patch: properly handle error in ntfsprogs/ntfsck.c. - CVE-2021-46790 * SECURITY UPDATE: traffic interception via incorrect return code - debian/patches/CVE-2022-30783.patch: return proper error code in libfuse-lite/mount.c, src/ntfs-3g_common.c, src/ntfs-3g_common.h. - CVE-2022-30783 * SECURITY UPDATE: heap exhaustion via invalid NTFS image - debian/patches/CVE-2022-30784.patch: Avoid allocating and reading an attribute beyond its full size in libntfs-3g/attrib.c. - CVE-2022-30784 * SECURITY UPDATE: arbitrary memory access via fuse - debian/patches/CVE-2022-30785_30787.patch: check directory offset in libfuse-lite/fuse.c. - CVE-2022-30785 - CVE-2022-30787 * SECURITY UPDATE: heap overflow via ntfs attribute names - debian/patches/CVE-2022-30786-1.patch: make sure there is no null character in an attribute name in libntfs-3g/attrib.c. - debian/patches/CVE-2022-30786-2.patch: make sure there is no null character in an attribute name in libntfs-3g/attrib.c. - CVE-2022-30786 * SECURITY UPDATE: heap buffer overflow via crafted NTFS image - debian/patches/CVE-2022-30788-1.patch: use a default usn when the former one cannot be retrieved in libntfs-3g/mft.c. - debian/patches/CVE-2022-30788-2.patch: fix operation on little endian data in libntfs-3g/mft.c. - CVE-2022-30788 * SECURITY UPDATE: heap buffer overflow via crafted NTFS image - debian/patches/CVE-2022-30789.patch: make sure the client log data does not overflow from restart page in libntfs-3g/logfile.c. - CVE-2022-30789 -- Marc Deslauriers <email address hidden> Mon, 06 Jun 2022 14:08:38 -0400
Available diffs
Superseded in kinetic-release |
Published in jammy-release |
Deleted in jammy-proposed (Reason: Moved to jammy) |
ntfs-3g (1:2021.8.22-3ubuntu1) jammy; urgency=medium * debian/control: - don't Build-Depends on libfuse-dev since the package is built using the --with-fuse=internal option, switch to fuse3 [ Simon Chopin ] * Merge with Debian unstable (LP: #1951239). Remaining changes: + Don't install /bin/ntfs-3g as setuid root. * Dropped, merged upstream: + SECURITY UPDATE: multiple security issues debian/patches/aug2021-security.patch: backport fixes from new upstream version. - CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257, CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261, CVE-2021-39262, CVE-2021-39263
Available diffs
ntfs-3g (1:2017.3.23AR.3-3ubuntu6) jammy; urgency=medium * debian/control: - change fuse depends to fuse3 -- Sebastien Bacher <email address hidden> Thu, 13 Jan 2022 09:26:03 +0100
Available diffs
Superseded in jammy-release |
Obsolete in impish-release |
Deleted in impish-proposed (Reason: Moved to impish) |
ntfs-3g (1:2017.3.23AR.3-3ubuntu5) impish; urgency=medium * SECURITY UPDATE: multiple security issues - debian/patches/aug2021-security.patch: backport fixes from new upstream version. - CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257, CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261, CVE-2021-39262, CVE-2021-39263 -- Marc Deslauriers <email address hidden> Mon, 23 Aug 2021 09:10:28 -0400
Available diffs
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.3) bionic-security; urgency=medium * SECURITY UPDATE: multiple security issues - debian/patches/aug2021-security.patch: backport fixes from new upstream version. - No CVE number -- Marc Deslauriers <email address hidden> Mon, 23 Aug 2021 09:25:29 -0400
ntfs-3g (1:2017.3.23AR.3-3ubuntu4.1) hirsute-security; urgency=medium * SECURITY UPDATE: multiple security issues - debian/patches/aug2021-security.patch: backport fixes from new upstream version. - No CVE number -- Marc Deslauriers <email address hidden> Mon, 23 Aug 2021 09:10:28 -0400
Available diffs
ntfs-3g (1:2017.3.23AR.3-3ubuntu1.1) focal-security; urgency=medium * SECURITY UPDATE: multiple security issues - debian/patches/aug2021-security.patch: backport fixes from new upstream version. - No CVE number -- Marc Deslauriers <email address hidden> Mon, 23 Aug 2021 09:18:46 -0400
Available diffs
Superseded in impish-release |
Obsolete in hirsute-release |
Deleted in hirsute-proposed (Reason: moved to Release) |
ntfs-3g (1:2017.3.23AR.3-3ubuntu4) hirsute; urgency=medium * No-change rebuild to drop the udeb package. -- Matthias Klose <email address hidden> Thu, 25 Feb 2021 06:59:05 +0100
Available diffs
ntfs-3g (1:2017.3.23AR.3-3ubuntu3) hirsute; urgency=medium * No-change rebuild to drop the udeb package. -- Matthias Klose <email address hidden> Mon, 22 Feb 2021 10:35:40 +0100
Available diffs
Superseded in hirsute-release |
Obsolete in groovy-release |
Deleted in groovy-proposed (Reason: moved to Release) |
ntfs-3g (1:2017.3.23AR.3-3ubuntu2) groovy; urgency=medium * No change rebuild to gain CET protection -- Dimitri John Ledkov <email address hidden> Thu, 18 Jun 2020 18:54:35 +0100
Available diffs
Superseded in groovy-release |
Published in focal-release |
Obsolete in eoan-release |
Deleted in eoan-proposed (Reason: moved to release) |
ntfs-3g (1:2017.3.23AR.3-3ubuntu1) eoan; urgency=low * Merge from Debian unstable. Remaining changes: - Don't install /bin/ntfs-3g as setuid root. * Dropped changes, included in Debian: - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch: Fixed reporting an error when failed to build the mountpoint
Available diffs
Published in xenial-updates |
Published in xenial-security |
Deleted in xenial-proposed (Reason: moved to -updates) |
ntfs-3g (1:2015.3.14AR.1-1ubuntu0.3) xenial-security; urgency=medium * Fix LP: #1821250 - Don't install /bin/ntfs-3g as setuid root. If administrators want to allow unprivileged users to be able to mount NTFS images, they can restore this functionality by changing the permissions of /bin/ntfs-3g with dpkg-statoverride - update debian/ntfs-3g.postinst -- Chris Coulson <email address hidden> Thu, 21 Mar 2019 21:33:36 +0000
Superseded in bionic-updates |
Superseded in bionic-security |
Deleted in bionic-proposed (Reason: moved to -updates) |
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.2) bionic-security; urgency=medium * Fix LP: #1821250 - Don't install /bin/ntfs-3g as setuid root. If administrators want to allow unprivileged users to be able to mount NTFS images, they can restore this functionality by changing the permissions of /bin/ntfs-3g with dpkg-statoverride - update debian/ntfs-3g.postinst -- Chris Coulson <email address hidden> Thu, 21 Mar 2019 21:33:01 +0000
Obsolete in cosmic-updates |
Obsolete in cosmic-security |
Deleted in cosmic-proposed (Reason: moved to -updates) |
ntfs-3g (1:2017.3.23-2ubuntu0.18.10.2) cosmic-security; urgency=medium * Fix LP: #1821250 - Don't install /bin/ntfs-3g as setuid root. If administrators want to allow unprivileged users to be able to mount NTFS images, they can restore this functionality by changing the permissions of /bin/ntfs-3g with dpkg-statoverride - update debian/ntfs-3g.postinst -- Chris Coulson <email address hidden> Thu, 21 Mar 2019 21:23:27 +0000
Superseded in eoan-release |
Obsolete in disco-release |
Deleted in disco-proposed (Reason: moved to release) |
ntfs-3g (1:2017.3.23AR.3-2ubuntu1) disco; urgency=medium * SECURITY UPDATE: Heap buffer overflow in /bin/ntfs-3g - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch: Fixed reporting an error when failed to build the mountpoint - CVE-2019-9755 * Don't install /bin/ntfs-3g as setuid root. If administrators want to allow unprivileged users to be able to mount NTFS images, they can restore this functionality by changing the permissions of /bin/ntfs-3g with dpkg-statoverride - update debian/ntfs-3g.postinst -- Chris Coulson <email address hidden> Thu, 21 Mar 2019 15:26:13 +0000
Available diffs
ntfs-3g (1:2017.3.23-2ubuntu0.18.10.1) cosmic-security; urgency=medium * SECURITY UPDATE: Heap buffer overflow in /bin/ntfs-3g - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch: Fixed reporting an error when failed to build the mountpoint - CVE-2019-9755 -- Chris Coulson <email address hidden> Thu, 14 Mar 2019 14:21:40 +0000
Available diffs
ntfs-3g (1:2015.3.14AR.1-1ubuntu0.2) xenial-security; urgency=medium * SECURITY UPDATE: Heap buffer overflow in /bin/ntfs-3g - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch: Fixed reporting an error when failed to build the mountpoint - CVE-2019-9755 -- Chris Coulson <email address hidden> Thu, 14 Mar 2019 15:36:07 +0000
Available diffs
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.1) bionic-security; urgency=medium * SECURITY UPDATE: Heap buffer overflow in /bin/ntfs-3g - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch: Fixed reporting an error when failed to build the mountpoint - CVE-2019-9755 -- Chris Coulson <email address hidden> Thu, 14 Mar 2019 14:21:40 +0000
Available diffs
ntfs-3g (1:2017.3.23AR.3-2) unstable; urgency=medium * Upload to Sid. * Don't use custom compression settings for packaging. * Update Standards-Version to 4.3.0 . -- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 26 Dec 2018 11:03:26 +0000
Available diffs
- diff from 1:2017.3.23-2 to 1:2017.3.23AR.3-2 (52.5 KiB)
Superseded in disco-release |
Obsolete in cosmic-release |
Published in bionic-release |
Deleted in bionic-proposed (Reason: moved to release) |
ntfs-3g (1:2017.3.23-2) unstable; urgency=medium * Start the transition with upload to Sid. -- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 30 Nov 2017 19:38:35 +0000
Available diffs
- diff from 1:2016.2.22AR.2-2 to 1:2017.3.23-2 (23.1 KiB)
Superseded in bionic-release |
Obsolete in artful-release |
Deleted in artful-proposed (Reason: moved to release) |
ntfs-3g (1:2016.2.22AR.2-2) unstable; urgency=medium * Start the transition with upload to Sid. -- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 22 Jun 2017 19:12:30 +0000
Available diffs
ntfs-3g (1:2016.2.22AR.1+dfsg-1) unstable; urgency=medium * Repack source to have a DFSG free NTFS boot sector (closes: #808463) and update copyright accordingly. * Update watch file to mangle +dfsg from source version. -- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 26 Feb 2017 12:34:31 +0000
Available diffs
Superseded in artful-release |
Obsolete in zesty-release |
Deleted in zesty-proposed (Reason: moved to release) |
ntfs-3g (1:2016.2.22AR.1-4) unstable; urgency=high * Fix CVE-2017-0358: modprobe influence vulnerability via environment variables. -- Laszlo Boszormenyi (GCS) <email address hidden> Wed, 01 Feb 2017 06:23:28 +0000
Available diffs
- diff from 1:2016.2.22AR.1-3 to 1:2016.2.22AR.1-4 (867 bytes)
ntfs-3g (1:2015.3.14AR.1-1ubuntu0.1) xenial-security; urgency=medium * SECURITY UPDATE: Improper environment scrubbing prior to executing modprobe could allow a local attacker to load arbitrary kernel modules - debian/patches/0002-CVE-2017-0358.patch: Execute modprobe with an empty environment. Based on patch from upstream. - CVE-2017-0358 -- Tyler Hicks <email address hidden> Fri, 27 Jan 2017 23:34:41 +0000
Available diffs
ntfs-3g (1:2016.2.22AR.1-3ubuntu0.1) yakkety-security; urgency=medium * SECURITY UPDATE: Improper environment scrubbing prior to executing modprobe could allow a local attacker to load arbitrary kernel modules - debian/patches/0003-CVE-2017-0358.patch: Execute modprobe with an empty environment. Based on patch from upstream. - CVE-2017-0358 -- Tyler Hicks <email address hidden> Fri, 27 Jan 2017 23:03:57 +0000
Available diffs
Superseded in zesty-release |
Obsolete in yakkety-release |
Deleted in yakkety-proposed (Reason: moved to release) |
ntfs-3g (1:2016.2.22AR.1-3) unstable; urgency=low * Really fix ELIBBAD errno on kFreeBSD (closes: #821838). * Add libntfs to kFreeBSD architectures. * Configure with mount-helper explicitly and add ntfs-3g-udeb to kFreeBSD architectures as well. -- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 21 Apr 2016 17:27:45 +0000
Available diffs
Superseded in yakkety-release |
Published in xenial-release |
Deleted in xenial-proposed (Reason: moved to release) |
ntfs-3g (1:2015.3.14AR.1-1build1) xenial; urgency=medium * No-change rebuild for gnutls transition. -- Matthias Klose <email address hidden> Wed, 17 Feb 2016 22:26:46 +0000
Available diffs
ntfs-3g (1:2015.3.14AR.1-1) unstable; urgency=low * New upstream release. * Don't run update-initramfs twice (closes: #787389). -- Laszlo Boszormenyi (GCS) <email address hidden> Tue, 01 Sep 2015 20:00:05 +0200
Available diffs
ntfs-3g (1:2014.2.15AR.3-1ubuntu2) wily; urgency=medium * SECURITY UPDATE: incomplete fix for privilege escalation issue - debian/patches/CVE-2015-3202.patch: changed another instance of execl in libfuse-lite/mount_util.c. - CVE-2015-3202 -- Marc Deslauriers <email address hidden> Wed, 27 May 2015 07:32:15 -0400
Available diffs
ntfs-3g (1:2014.2.15AR.3-1ubuntu0.2) vivid-security; urgency=medium * SECURITY UPDATE: incomplete fix for privilege escalation issue - debian/patches/CVE-2015-3202.patch: changed another instance of execl in libfuse-lite/mount_util.c. - CVE-2015-3202 -- Marc Deslauriers <email address hidden> Wed, 27 May 2015 07:29:40 -0400
Available diffs
Superseded in xenial-release |
Obsolete in wily-release |
Deleted in wily-proposed (Reason: moved to release) |
ntfs-3g (1:2014.2.15AR.3-3) unstable; urgency=high [ Salvatore Bonaccorso <email address hidden> ] * Change all relevant execl() calls to execle() to fix all possible cases of CVE-2015-3202 (closes: #786475). -- Laszlo Boszormenyi (GCS) <email address hidden> Tue, 26 May 2015 17:23:19 +0000
Available diffs
ntfs-3g (1:2014.2.15AR.3-1ubuntu1) wily; urgency=medium * SECURITY UPDATE: privilege escalation via insecure environment - debian/patches/CVE-2015-3202.patch: use execle to run external helpers in libfuse-lite/mount_util.c. - CVE-2015-3202 -- Marc Deslauriers <email address hidden> Fri, 22 May 2015 08:16:42 -0400
Available diffs
ntfs-3g (1:2014.2.15AR.3-1ubuntu0.1) vivid-security; urgency=medium * SECURITY UPDATE: privilege escalation via insecure environment - debian/patches/CVE-2015-3202.patch: use execle to run external helpers in libfuse-lite/mount_util.c. - CVE-2015-3202 -- Marc Deslauriers <email address hidden> Fri, 22 May 2015 08:14:37 -0400
Available diffs
Superseded in wily-release |
Obsolete in vivid-release |
Deleted in vivid-proposed (Reason: moved to release) |
ntfs-3g (1:2014.2.15AR.3-1) unstable; urgency=medium * New upstream release. * Fix FUSE fallback for old 2.6.x kernels (closes: #766911). -- Laszlo Boszormenyi (GCS) <email address hidden> Thu, 13 Nov 2014 05:43:59 +0000
Available diffs
ntfs-3g (1:2014.2.15AR.2-1) unstable; urgency=low * New upstream release. * Remove 0001-type-inconsistencies.patch and 0002-exit-values.patch , this release contains those. * Update Standards-Version to 3.9.6 . -- Laszlo Boszormenyi (GCS) <email address hidden> Sun, 05 Oct 2014 09:34:12 +0000
Available diffs
Superseded in vivid-release |
Obsolete in utopic-release |
Deleted in utopic-proposed (Reason: moved to release) |
ntfs-3g (1:2013.1.13AR.1-2ubuntu3) utopic; urgency=high * No change rebuild against gnutls28. -- Dimitri John Ledkov <email address hidden> Fri, 08 Aug 2014 13:56:03 +0100
Available diffs
Superseded in utopic-release |
Published in trusty-release |
Deleted in trusty-proposed (Reason: moved to release) |
ntfs-3g (1:2013.1.13AR.1-2ubuntu2) trusty; urgency=medium * Use dh-autoreconf to update libtool.m4 for new ports. -- Colin Watson <email address hidden> Wed, 18 Dec 2013 15:25:50 +0000
Available diffs
Superseded in trusty-release |
Obsolete in saucy-release |
Deleted in saucy-proposed (Reason: moved to release) |
ntfs-3g (1:2013.1.13AR.1-2ubuntu1) saucy; urgency=low * Merge from Debian, remaining changes: - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu.
Available diffs
Superseded in saucy-release |
Obsolete in raring-release |
Deleted in raring-proposed (Reason: moved to release) |
ntfs-3g (1:2013.1.13-1+0ubuntu2) raring; urgency=low * Make sure ntfs-3g library is installed in /lib. (LP: #1132392) -- Dmitrijs Ledkovs <email address hidden> Mon, 25 Feb 2013 11:25:52 +0000
Available diffs
ntfs-3g (1:2013.1.13-1+0ubuntu1) raring; urgency=low * Use a virtual package to generate tighter reverse-dependencies, as the soname is ever-changing. (LP: #1126547) * Use parallel build. * Acknowledge stealing debian's -1 upload version number. * Fix libntfs-3g.so symlink. -- Dmitrijs Ledkovs <email address hidden> Sat, 16 Feb 2013 05:45:13 +0000
Available diffs
ntfs-3g (1:2013.1.13-1) raring; urgency=low * New upstream release. (LP: #1106257) * Use dh_autoreconf * Resynchronise with Debian (LP: #1118379). Remaining changes: - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu. * Dropped patches, applied upstream: - Add readonly-devices.patch: Mount read-only devices as read-only instead of failing. - ntfs-3g-junction-point-fix.patch: Return the correct type (DT_LINK) for NTFS Junction points, in readdir().
Available diffs
ntfs-3g (1:2012.1.15AR.1-1ubuntu1.2) precise-proposed; urgency=low * Add readonly-devices.patch: Mount read-only devices as read-only instead of failing. Thanks to Jean Pierre Andre for the patch! (LP: #435192)
Available diffs
ntfs-3g (1:2012.1.15AR.5-4ubuntu3) quantal; urgency=low * Add readonly-devices.patch: Mount read-only devices as read-only instead of failing. Thanks to Jean Pierre Andre for the patch! (LP: #435192) -- Martin Pitt <email address hidden> Mon, 10 Sep 2012 07:37:38 +0200
Available diffs
Superseded in precise-proposed |
ntfs-3g (1:2012.1.15AR.1-1ubuntu1.1) precise-proposed; urgency=low * ntfs-3g-junction-point-fix.patch: Return the correct type (DT_LINK) for NTFS Junction points, in readdir(). (LP: #997391) Junction points are the NTFS equivalent of symlinks and should be listed as such. Fixes an infinite loop in baobab when scanning a Windows 7 root file system. -- Stefano Rivera <email address hidden> Sat, 25 Aug 2012 22:17:25 +0200
Available diffs
Superseded in quantal-release |
ntfs-3g (1:2012.1.15AR.5-4ubuntu2) quantal; urgency=low * ntfs-3g-junction-point-fix.patch: Return the correct type (DT_LINK) for NTFS Junction points, in readdir(). (LP: #997391) -- Stefano Rivera <email address hidden> Tue, 21 Aug 2012 22:27:42 +0200
Available diffs
Superseded in quantal-release |
ntfs-3g (1:2012.1.15AR.5-4ubuntu1) quantal; urgency=low * Resynchronise with Debian. Remaining changes: - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu.
Available diffs
Superseded in quantal-release |
ntfs-3g (1:2012.1.15AR.5-2ubuntu1) quantal; urgency=low * Resynchronise with Debian. Remaining changes: - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu.
Available diffs
Superseded in quantal-release |
ntfs-3g (1:2012.1.15AR.5-1ubuntu1) quantal; urgency=low * Resynchronise with Debian. Remaining changes: - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu. * Drop dependency changes only relevant for upgrades from before 12.04.
Available diffs
ntfs-3g (1:2012.1.15AR.1-1ubuntu1) precise; urgency=low * Resynchronise with Debian (LP: #920545). Remaining changes: - Depend on suitable versions of initramfs-tools and initscripts for /run support. - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu.
Available diffs
Superseded in precise-release |
ntfs-3g (1:2011.10.9AR.1-1ubuntu3) precise; urgency=low * Revert to gnutls26. It looks as though we'll be sticking with that for precise. -- Colin Watson <email address hidden> Tue, 10 Jan 2012 10:52:47 +0000
Available diffs
Superseded in precise-release |
ntfs-3g (1:2011.10.9AR.1-1ubuntu2) precise; urgency=low * Switch to gnutls28. -- Colin Watson <email address hidden> Fri, 06 Jan 2012 14:13:43 +0000
Available diffs
Superseded in precise-release |
ntfs-3g (1:2011.10.9AR.1-1ubuntu1) precise; urgency=low * Resynchronise with Debian (LP: #892229). Remaining changes: - Add an ntfs-3g-udeb package. - Depend on suitable versions of initramfs-tools and initscripts for /run support. - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu.
Available diffs
Superseded in precise-release |
ntfs-3g (1:2011.4.12AR.4-2ubuntu4) precise; urgency=low * Depend on fuse/fuse-udeb rather than fuse-utils/fuse-utils-udeb. Adjust initramfs hook prerequisites to match. -- Colin Watson <email address hidden> Fri, 25 Nov 2011 08:52:03 +0000
Available diffs
ntfs-3g (1:2011.4.12AR.4-2ubuntu3) oneiric; urgency=low * Cherry-pick from 1:2011.4.12AR.6-2 (LP: #864787): - Correcting freudian typo in directory name when creating the libntfs-3g.so symlink for ntfs-3g-dev (Closes: #634755). -- Colin Watson <email address hidden> Mon, 03 Oct 2011 00:03:56 +0100
Available diffs
Superseded in oneiric-release |
ntfs-3g (1:2011.4.12AR.4-2ubuntu2) oneiric; urgency=low * Add ntfsresize to ntfs-3g-udeb, taking it over from ntfsprogs-udeb. -- Colin Watson <email address hidden> Tue, 16 Aug 2011 16:10:18 +0100
Available diffs
Superseded in oneiric-release |
ntfs-3g (1:2011.4.12AR.4-2ubuntu1) oneiric; urgency=low * Resynchronise with Debian (LP: #788368). Remaining changes: - Add a ntfs-3g-udeb package. - Depend on suitable versions of initramfs-tools and initscripts for /run support. - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu.
Available diffs
Superseded in oneiric-release |
ntfs-3g (1:2011.1.15-0.1ubuntu2) oneiric; urgency=low * Migrate from /dev/.initramfs/varrun/sendsigs.omit to /run/sendsigs.omit.d/ntfs-3g. -- Colin Watson <email address hidden> Fri, 15 Jul 2011 13:50:03 +0100
Available diffs
Superseded in oneiric-release |
ntfs-3g (1:2011.1.15-0.1ubuntu1) oneiric; urgency=low * Resynchronise with Debian (LP: #660418). Remaining changes: - Install to /bin and /lib rather than /usr/bin and /usr/lib. - Create libntfs3g80-udeb and ntfs-3g-udeb packages. - Build with external FUSE and pre-depend on fuse-utils. - Copy ntfs-3g into the initramfs. If ntfs-3g is used to mount the root filesystem (either directly or via a loopback mount), load the fuse module beforehand, and save ntfs-3g's PID (indirectly) in /var/run/sendsigs.omit. - Add a symlink for the mount.ntfs manpage. - Accept "syncio" mount option (a synonym for "sync") for compatibility with older versions of Ubuntu.
Available diffs
ntfs-3g (1:2010.8.8-0ubuntu1) maverick; urgency=low * New upstream release (LP: #618281). * Update library package name from libntfs-3g75 to libntfs-3g79. * Update changes/ChangeLog for latest upstream release. -- Colin Watson <email address hidden> Wed, 15 Sep 2010 21:52:28 +0100
Available diffs
ntfs-3g (1:2010.3.6-1ubuntu1) lucid; urgency=low * Resynchronise with Debian (LP: #513197). Remaining changes: - Install to /bin and /lib rather than /usr/bin and /usr/lib. - Create libntfs3g75-udeb and ntfs-3g-udeb packages. - Build with external FUSE and pre-depend on fuse-utils. - Copy ntfs-3g into the initramfs. If ntfs-3g is used to mount the root filesystem (either directly or via a loopback mount), load the fuse module beforehand, and save ntfs-3g's PID (indirectly) in /var/run/sendsigs.omit. - Add a symlink for the mount.ntfs manpage. - Ensure ntfs-3g flushes dirty write data back to device. Add ntfs-3g mount option "syncio" which opens the underlying filesystem used by fuse with O_SYNC to ensure dirty write data is written back to ntfs immediately. This allows us to remove the vm.dirty sysctl hacks from wubi. - Fix "no_detatch" -> "no_detach" typo in HAL fdi file. * Fix from upstream in 2010.3.6: Make non-resident TXF_DATA attribute of root directory resident so Vista and later won’t complain about RAW partition (LP: #514223).
Available diffs
Superseded in lucid-release |
ntfs-3g (1:2009.4.4-1ubuntu5) lucid; urgency=low * debian/ntfs-3g.initramfs-bottom: - also guard as we do for the local-premount script, those pidofs costs a hundredth of a second each y'know -- Scott James Remnant <email address hidden> Fri, 18 Dec 2009 02:29:46 +0000
Available diffs
ntfs-3g (1:2009.4.4-1ubuntu4) karmic; urgency=low * Make syncio mount option imply sync. (Why are these separate, anyway?) -- Colin Watson <email address hidden> Fri, 09 Oct 2009 12:10:45 +0100
Available diffs
1 → 75 of 114 results | First • Previous • Next • Last |