Change log for ntfs-3g package in Ubuntu

175 of 114 results
Published in oracular-release
Published in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
ntfs-3g (1:2022.10.3-1.2ubuntu3) noble; urgency=high

  * No change rebuild against libgnutls30t64.

 -- Julian Andres Klode <email address hidden>  Mon, 08 Apr 2024 16:46:29 +0200
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
ntfs-3g (1:2022.10.3-1.2ubuntu2) noble; urgency=medium

  * No-change rebuild for CVE-2024-3094

 -- Steve Langasek <email address hidden>  Sun, 31 Mar 2024 08:10:22 +0000
Superseded in noble-release
Deleted in noble-proposed (Reason: Moved to noble)
ntfs-3g (1:2022.10.3-1.2ubuntu1) noble; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - d/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root.

Superseded in noble-proposed
ntfs-3g (1:2022.10.3-1.1ubuntu1) noble; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - d/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root.

Deleted in noble-updates (Reason: superseded by release)
Superseded in noble-release
Published in mantic-release
Published in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
ntfs-3g (1:2022.10.3-1ubuntu1) lunar; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - debian/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root.

 -- Dan Bungert <email address hidden>  Tue, 14 Feb 2023 12:47:55 -0700
Published in bionic-updates
Published in bionic-security
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.5) bionic-security; urgency=medium

  * SECURITY UPDATE: code execution via incorrect validation of metadata
    - debian/patches/CVE-2022-40284-1.patch: rejected zero-sized runs in
      libntfs-3g/runlist.c.
    - debian/patches/CVE-2022-40284-2.patch: avoided merging runlists with
      no runs in libntfs-3g/runlist.c.
    - CVE-2022-40284

 -- Marc Deslauriers <email address hidden>  Tue, 01 Nov 2022 07:57:16 -0400
Published in focal-updates
Published in focal-security
ntfs-3g (1:2017.3.23AR.3-3ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: code execution via incorrect validation of metadata
    - debian/patches/CVE-2022-40284-1.patch: rejected zero-sized runs in
      libntfs-3g/runlist.c.
    - debian/patches/CVE-2022-40284-2.patch: avoided merging runlists with
      no runs in libntfs-3g/runlist.c.
    - CVE-2022-40284

 -- Marc Deslauriers <email address hidden>  Tue, 01 Nov 2022 07:56:50 -0400
Published in jammy-updates
Published in jammy-security
ntfs-3g (1:2021.8.22-3ubuntu1.2) jammy-security; urgency=medium

  * SECURITY UPDATE: code execution via incorrect validation of metadata
    - debian/patches/CVE-2022-40284-1.patch: rejected zero-sized runs in
      libntfs-3g/runlist.c.
    - debian/patches/CVE-2022-40284-2.patch: avoided merging runlists with
      no runs in libntfs-3g/runlist.c.
    - CVE-2022-40284

 -- Marc Deslauriers <email address hidden>  Tue, 01 Nov 2022 07:56:19 -0400
Superseded in lunar-release
Deleted in lunar-proposed (Reason: Moved to lunar)
Obsolete in kinetic-updates
Obsolete in kinetic-security
ntfs-3g (1:2022.5.17-1ubuntu1.1) kinetic-security; urgency=medium

  * SECURITY UPDATE: code execution via incorrect validation of metadata
    - debian/patches/CVE-2022-40284-1.patch: rejected zero-sized runs in
      libntfs-3g/runlist.c.
    - debian/patches/CVE-2022-40284-2.patch: avoided merging runlists with
      no runs in libntfs-3g/runlist.c.
    - CVE-2022-40284

 -- Marc Deslauriers <email address hidden>  Tue, 01 Nov 2022 07:53:35 -0400
Superseded in lunar-release
Obsolete in kinetic-release
Deleted in kinetic-proposed (Reason: Moved to kinetic)
ntfs-3g (1:2022.5.17-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - debian/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root.
    - debian/control: don't Build-Depends on libfuse-dev since the package
      is built using the --with-fuse=internal option, switch to fuse3.

Superseded in focal-updates
Superseded in focal-security
ntfs-3g (1:2017.3.23AR.3-3ubuntu1.2) focal-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in ntfsck
    - debian/patches/CVE-2021-46790.patch: properly handle error in
      ntfsprogs/ntfsck.c.
    - CVE-2021-46790
  * SECURITY UPDATE: traffic interception via incorrect return code
    - debian/patches/CVE-2022-30783.patch: return proper error code in
      libfuse-lite/mount.c, src/ntfs-3g_common.c, src/ntfs-3g_common.h.
    - CVE-2022-30783
  * SECURITY UPDATE: heap exhaustion via invalid NTFS image
    - debian/patches/CVE-2022-30784.patch: Avoid allocating and reading an
      attribute beyond its full size in libntfs-3g/attrib.c.
    - CVE-2022-30784
  * SECURITY UPDATE: arbitrary memory access via fuse
    - debian/patches/CVE-2022-30785_30787.patch: check directory offset in
      libfuse-lite/fuse.c.
    - CVE-2022-30785
    - CVE-2022-30787
  * SECURITY UPDATE: heap overflow via ntfs attribute names
    - debian/patches/CVE-2022-30786-1.patch: make sure there is no null
      character in an attribute name in libntfs-3g/attrib.c.
    - debian/patches/CVE-2022-30786-2.patch: make sure there is no null
      character in an attribute name in libntfs-3g/attrib.c.
    - CVE-2022-30786
  * SECURITY UPDATE: heap buffer overflow via crafted NTFS image
    - debian/patches/CVE-2022-30788-1.patch: use a default usn when the
      former one cannot be retrieved in libntfs-3g/mft.c.
    - debian/patches/CVE-2022-30788-2.patch: fix operation on little endian
      data in libntfs-3g/mft.c.
    - CVE-2022-30788
  * SECURITY UPDATE: heap buffer overflow via crafted NTFS image
    - debian/patches/CVE-2022-30789.patch: make sure the client log data
      does not overflow from restart page in libntfs-3g/logfile.c.
    - CVE-2022-30789

 -- Marc Deslauriers <email address hidden>  Mon, 06 Jun 2022 14:09:42 -0400
Superseded in jammy-updates
Superseded in jammy-security
ntfs-3g (1:2021.8.22-3ubuntu1.1) jammy-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in ntfsck
    - debian/patches/CVE-2021-46790.patch: properly handle error in
      ntfsprogs/ntfsck.c.
    - CVE-2021-46790
  * SECURITY UPDATE: traffic interception via incorrect return code
    - debian/patches/CVE-2022-30783.patch: return proper error code in
      libfuse-lite/mount.c, src/ntfs-3g_common.c, src/ntfs-3g_common.h.
    - CVE-2022-30783
  * SECURITY UPDATE: heap exhaustion via invalid NTFS image
    - debian/patches/CVE-2022-30784.patch: Avoid allocating and reading an
      attribute beyond its full size in libntfs-3g/attrib.c.
    - CVE-2022-30784
  * SECURITY UPDATE: arbitrary memory access via fuse
    - debian/patches/CVE-2022-30785_30787.patch: check directory offset in
      libfuse-lite/fuse.c.
    - CVE-2022-30785
    - CVE-2022-30787
  * SECURITY UPDATE: heap overflow via ntfs attribute names
    - debian/patches/CVE-2022-30786-1.patch: make sure there is no null
      character in an attribute name in libntfs-3g/attrib.c.
    - debian/patches/CVE-2022-30786-2.patch: make sure there is no null
      character in an attribute name in libntfs-3g/attrib.c.
    - CVE-2022-30786
  * SECURITY UPDATE: heap buffer overflow via crafted NTFS image
    - debian/patches/CVE-2022-30788-1.patch: use a default usn when the
      former one cannot be retrieved in libntfs-3g/mft.c.
    - debian/patches/CVE-2022-30788-2.patch: fix operation on little endian
      data in libntfs-3g/mft.c.
    - CVE-2022-30788
  * SECURITY UPDATE: heap buffer overflow via crafted NTFS image
    - debian/patches/CVE-2022-30789.patch: make sure the client log data
      does not overflow from restart page in libntfs-3g/logfile.c.
    - CVE-2022-30789

 -- Marc Deslauriers <email address hidden>  Mon, 06 Jun 2022 13:57:00 -0400
Superseded in bionic-updates
Superseded in bionic-security
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.4) bionic-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in ntfsck
    - debian/patches/CVE-2021-46790.patch: properly handle error in
      ntfsprogs/ntfsck.c.
    - CVE-2021-46790
  * SECURITY UPDATE: traffic interception via incorrect return code
    - debian/patches/CVE-2022-30783.patch: return proper error code in
      libfuse-lite/mount.c, src/ntfs-3g_common.c, src/ntfs-3g_common.h.
    - CVE-2022-30783
  * SECURITY UPDATE: heap exhaustion via invalid NTFS image
    - debian/patches/CVE-2022-30784.patch: Avoid allocating and reading an
      attribute beyond its full size in libntfs-3g/attrib.c.
    - CVE-2022-30784
  * SECURITY UPDATE: arbitrary memory access via fuse
    - debian/patches/CVE-2022-30785_30787.patch: check directory offset in
      libfuse-lite/fuse.c.
    - CVE-2022-30785
    - CVE-2022-30787
  * SECURITY UPDATE: heap overflow via ntfs attribute names
    - debian/patches/CVE-2022-30786-1.patch: make sure there is no null
      character in an attribute name in libntfs-3g/attrib.c.
    - debian/patches/CVE-2022-30786-2.patch: make sure there is no null
      character in an attribute name in libntfs-3g/attrib.c.
    - CVE-2022-30786
  * SECURITY UPDATE: heap buffer overflow via crafted NTFS image
    - debian/patches/CVE-2022-30788-1.patch: use a default usn when the
      former one cannot be retrieved in libntfs-3g/mft.c.
    - debian/patches/CVE-2022-30788-2.patch: fix operation on little endian
      data in libntfs-3g/mft.c.
    - CVE-2022-30788
  * SECURITY UPDATE: heap buffer overflow via crafted NTFS image
    - debian/patches/CVE-2022-30789.patch: make sure the client log data
      does not overflow from restart page in libntfs-3g/logfile.c.
    - CVE-2022-30789

 -- Marc Deslauriers <email address hidden>  Mon, 06 Jun 2022 14:11:22 -0400
Obsolete in impish-updates
Obsolete in impish-security
ntfs-3g (1:2017.3.23AR.3-3ubuntu5.1) impish-security; urgency=medium

  * SECURITY UPDATE: heap buffer overflow in ntfsck
    - debian/patches/CVE-2021-46790.patch: properly handle error in
      ntfsprogs/ntfsck.c.
    - CVE-2021-46790
  * SECURITY UPDATE: traffic interception via incorrect return code
    - debian/patches/CVE-2022-30783.patch: return proper error code in
      libfuse-lite/mount.c, src/ntfs-3g_common.c, src/ntfs-3g_common.h.
    - CVE-2022-30783
  * SECURITY UPDATE: heap exhaustion via invalid NTFS image
    - debian/patches/CVE-2022-30784.patch: Avoid allocating and reading an
      attribute beyond its full size in libntfs-3g/attrib.c.
    - CVE-2022-30784
  * SECURITY UPDATE: arbitrary memory access via fuse
    - debian/patches/CVE-2022-30785_30787.patch: check directory offset in
      libfuse-lite/fuse.c.
    - CVE-2022-30785
    - CVE-2022-30787
  * SECURITY UPDATE: heap overflow via ntfs attribute names
    - debian/patches/CVE-2022-30786-1.patch: make sure there is no null
      character in an attribute name in libntfs-3g/attrib.c.
    - debian/patches/CVE-2022-30786-2.patch: make sure there is no null
      character in an attribute name in libntfs-3g/attrib.c.
    - CVE-2022-30786
  * SECURITY UPDATE: heap buffer overflow via crafted NTFS image
    - debian/patches/CVE-2022-30788-1.patch: use a default usn when the
      former one cannot be retrieved in libntfs-3g/mft.c.
    - debian/patches/CVE-2022-30788-2.patch: fix operation on little endian
      data in libntfs-3g/mft.c.
    - CVE-2022-30788
  * SECURITY UPDATE: heap buffer overflow via crafted NTFS image
    - debian/patches/CVE-2022-30789.patch: make sure the client log data
      does not overflow from restart page in libntfs-3g/logfile.c.
    - CVE-2022-30789

 -- Marc Deslauriers <email address hidden>  Mon, 06 Jun 2022 14:08:38 -0400
Superseded in kinetic-release
Published in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
ntfs-3g (1:2021.8.22-3ubuntu1) jammy; urgency=medium

  * debian/control:
    - don't Build-Depends on libfuse-dev since the package is built using
      the --with-fuse=internal option, switch to fuse3

  [ Simon Chopin ]
  * Merge with Debian unstable (LP: #1951239). Remaining changes:
    + Don't install /bin/ntfs-3g as setuid root.
  * Dropped, merged upstream:
    + SECURITY UPDATE: multiple security issues
      debian/patches/aug2021-security.patch: backport fixes from new
      upstream version.
      - CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289,
        CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269,
        CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254,
        CVE-2021-39255, CVE-2021-39256, CVE-2021-39257, CVE-2021-39258,
        CVE-2021-39259, CVE-2021-39260, CVE-2021-39261, CVE-2021-39262,
        CVE-2021-39263

Superseded in jammy-release
Deleted in jammy-proposed (Reason: Moved to jammy)
ntfs-3g (1:2017.3.23AR.3-3ubuntu6) jammy; urgency=medium

  * debian/control:
    - change fuse depends to fuse3

 -- Sebastien Bacher <email address hidden>  Thu, 13 Jan 2022 09:26:03 +0100
Superseded in jammy-release
Obsolete in impish-release
Deleted in impish-proposed (Reason: Moved to impish)
ntfs-3g (1:2017.3.23AR.3-3ubuntu5) impish; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/aug2021-security.patch: backport fixes from new
      upstream version.
    - CVE-2021-33285, CVE-2021-33286, CVE-2021-33287, CVE-2021-33289,
      CVE-2021-35266, CVE-2021-35267, CVE-2021-35268, CVE-2021-35269,
      CVE-2021-39251, CVE-2021-39252, CVE-2021-39253, CVE-2021-39254,
      CVE-2021-39255, CVE-2021-39256, CVE-2021-39257, CVE-2021-39258,
      CVE-2021-39259, CVE-2021-39260, CVE-2021-39261, CVE-2021-39262,
      CVE-2021-39263

 -- Marc Deslauriers <email address hidden>  Mon, 23 Aug 2021 09:10:28 -0400
Superseded in bionic-updates
Superseded in bionic-security
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.3) bionic-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/aug2021-security.patch: backport fixes from new
      upstream version.
    - No CVE number

 -- Marc Deslauriers <email address hidden>  Mon, 23 Aug 2021 09:25:29 -0400
Obsolete in hirsute-updates
Obsolete in hirsute-security
ntfs-3g (1:2017.3.23AR.3-3ubuntu4.1) hirsute-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/aug2021-security.patch: backport fixes from new
      upstream version.
    - No CVE number

 -- Marc Deslauriers <email address hidden>  Mon, 23 Aug 2021 09:10:28 -0400
Superseded in focal-updates
Superseded in focal-security
ntfs-3g (1:2017.3.23AR.3-3ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: multiple security issues
    - debian/patches/aug2021-security.patch: backport fixes from new
      upstream version.
    - No CVE number

 -- Marc Deslauriers <email address hidden>  Mon, 23 Aug 2021 09:18:46 -0400
Superseded in impish-release
Obsolete in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
ntfs-3g (1:2017.3.23AR.3-3ubuntu4) hirsute; urgency=medium

  * No-change rebuild to drop the udeb package.

 -- Matthias Klose <email address hidden>  Thu, 25 Feb 2021 06:59:05 +0100
Superseded in hirsute-release
Deleted in hirsute-proposed (Reason: moved to Release)
ntfs-3g (1:2017.3.23AR.3-3ubuntu3) hirsute; urgency=medium

  * No-change rebuild to drop the udeb package.

 -- Matthias Klose <email address hidden>  Mon, 22 Feb 2021 10:35:40 +0100
Superseded in hirsute-release
Obsolete in groovy-release
Deleted in groovy-proposed (Reason: moved to Release)
ntfs-3g (1:2017.3.23AR.3-3ubuntu2) groovy; urgency=medium

  * No change rebuild to gain CET protection

 -- Dimitri John Ledkov <email address hidden>  Thu, 18 Jun 2020 18:54:35 +0100
Superseded in groovy-release
Published in focal-release
Obsolete in eoan-release
Deleted in eoan-proposed (Reason: moved to release)
ntfs-3g (1:2017.3.23AR.3-3ubuntu1) eoan; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    - Don't install /bin/ntfs-3g as setuid root.
  * Dropped changes, included in Debian:
    - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch:
      Fixed reporting an error when failed to build the mountpoint

Published in xenial-updates
Published in xenial-security
Deleted in xenial-proposed (Reason: moved to -updates)
ntfs-3g (1:2015.3.14AR.1-1ubuntu0.3) xenial-security; urgency=medium

  * Fix LP: #1821250 - Don't install /bin/ntfs-3g as setuid root. If
    administrators want to allow unprivileged users to be able to mount NTFS
    images, they can restore this functionality by changing the permissions of
    /bin/ntfs-3g with dpkg-statoverride
    - update debian/ntfs-3g.postinst

 -- Chris Coulson <email address hidden>  Thu, 21 Mar 2019 21:33:36 +0000
Superseded in bionic-updates
Superseded in bionic-security
Deleted in bionic-proposed (Reason: moved to -updates)
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.2) bionic-security; urgency=medium

  * Fix LP: #1821250 - Don't install /bin/ntfs-3g as setuid root. If
    administrators want to allow unprivileged users to be able to mount NTFS
    images, they can restore this functionality by changing the permissions of
    /bin/ntfs-3g with dpkg-statoverride
    - update debian/ntfs-3g.postinst

 -- Chris Coulson <email address hidden>  Thu, 21 Mar 2019 21:33:01 +0000
Obsolete in cosmic-updates
Obsolete in cosmic-security
Deleted in cosmic-proposed (Reason: moved to -updates)
ntfs-3g (1:2017.3.23-2ubuntu0.18.10.2) cosmic-security; urgency=medium

  * Fix LP: #1821250 - Don't install /bin/ntfs-3g as setuid root. If
    administrators want to allow unprivileged users to be able to mount NTFS
    images, they can restore this functionality by changing the permissions of
    /bin/ntfs-3g with dpkg-statoverride
    - update debian/ntfs-3g.postinst

 -- Chris Coulson <email address hidden>  Thu, 21 Mar 2019 21:23:27 +0000
Superseded in eoan-release
Obsolete in disco-release
Deleted in disco-proposed (Reason: moved to release)
ntfs-3g (1:2017.3.23AR.3-2ubuntu1) disco; urgency=medium

  * SECURITY UPDATE: Heap buffer overflow in /bin/ntfs-3g
    - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch:
      Fixed reporting an error when failed to build the mountpoint
    - CVE-2019-9755

  * Don't install /bin/ntfs-3g as setuid root. If administrators want to allow
    unprivileged users to be able to mount NTFS images, they can restore this
    functionality by changing the permissions of /bin/ntfs-3g with
    dpkg-statoverride
    - update debian/ntfs-3g.postinst

 -- Chris Coulson <email address hidden>  Thu, 21 Mar 2019 15:26:13 +0000
Superseded in cosmic-updates
Superseded in cosmic-security
ntfs-3g (1:2017.3.23-2ubuntu0.18.10.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: Heap buffer overflow in /bin/ntfs-3g
    - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch:
      Fixed reporting an error when failed to build the mountpoint
    - CVE-2019-9755

 -- Chris Coulson <email address hidden>  Thu, 14 Mar 2019 14:21:40 +0000
Superseded in xenial-updates
Superseded in xenial-security
ntfs-3g (1:2015.3.14AR.1-1ubuntu0.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Heap buffer overflow in /bin/ntfs-3g
    - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch:
      Fixed reporting an error when failed to build the mountpoint
    - CVE-2019-9755

 -- Chris Coulson <email address hidden>  Thu, 14 Mar 2019 15:36:07 +0000
Superseded in bionic-updates
Superseded in bionic-security
ntfs-3g (1:2017.3.23-2ubuntu0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Heap buffer overflow in /bin/ntfs-3g
    - debian/patches/0001-Fixed-reporting-an-error-when-failed-to-build-the-mo.patch:
      Fixed reporting an error when failed to build the mountpoint
    - CVE-2019-9755

 -- Chris Coulson <email address hidden>  Thu, 14 Mar 2019 14:21:40 +0000
Superseded in disco-release
Deleted in disco-proposed (Reason: moved to release)
ntfs-3g (1:2017.3.23AR.3-2) unstable; urgency=medium

  * Upload to Sid.
  * Don't use custom compression settings for packaging.
  * Update Standards-Version to 4.3.0 .

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Wed, 26 Dec 2018 11:03:26 +0000
Superseded in disco-release
Obsolete in cosmic-release
Published in bionic-release
Deleted in bionic-proposed (Reason: moved to release)
ntfs-3g (1:2017.3.23-2) unstable; urgency=medium

  * Start the transition with upload to Sid.

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Thu, 30 Nov 2017 19:38:35 +0000
Superseded in bionic-release
Obsolete in artful-release
Deleted in artful-proposed (Reason: moved to release)
ntfs-3g (1:2016.2.22AR.2-2) unstable; urgency=medium

  * Start the transition with upload to Sid.

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Thu, 22 Jun 2017 19:12:30 +0000
Superseded in artful-release
Deleted in artful-proposed (Reason: moved to release)
ntfs-3g (1:2016.2.22AR.1+dfsg-1) unstable; urgency=medium

  * Repack source to have a DFSG free NTFS boot sector (closes: #808463) and
    update copyright accordingly.
  * Update watch file to mangle +dfsg from source version.

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Sun, 26 Feb 2017 12:34:31 +0000
Superseded in artful-release
Obsolete in zesty-release
Deleted in zesty-proposed (Reason: moved to release)
ntfs-3g (1:2016.2.22AR.1-4) unstable; urgency=high

  * Fix CVE-2017-0358: modprobe influence vulnerability via environment
    variables.

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Wed, 01 Feb 2017 06:23:28 +0000
Superseded in xenial-updates
Superseded in xenial-security
ntfs-3g (1:2015.3.14AR.1-1ubuntu0.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Improper environment scrubbing prior to executing
    modprobe could allow a local attacker to load arbitrary kernel modules
    - debian/patches/0002-CVE-2017-0358.patch: Execute modprobe with an empty
      environment. Based on patch from upstream.
    - CVE-2017-0358

 -- Tyler Hicks <email address hidden>  Fri, 27 Jan 2017 23:34:41 +0000
Obsolete in yakkety-updates
Obsolete in yakkety-security
ntfs-3g (1:2016.2.22AR.1-3ubuntu0.1) yakkety-security; urgency=medium

  * SECURITY UPDATE: Improper environment scrubbing prior to executing
    modprobe could allow a local attacker to load arbitrary kernel modules
    - debian/patches/0003-CVE-2017-0358.patch: Execute modprobe with an empty
      environment. Based on patch from upstream.
    - CVE-2017-0358

 -- Tyler Hicks <email address hidden>  Fri, 27 Jan 2017 23:03:57 +0000
Superseded in zesty-release
Obsolete in yakkety-release
Deleted in yakkety-proposed (Reason: moved to release)
ntfs-3g (1:2016.2.22AR.1-3) unstable; urgency=low

  * Really fix ELIBBAD errno on kFreeBSD (closes: #821838).
  * Add libntfs to kFreeBSD architectures.
  * Configure with mount-helper explicitly and add ntfs-3g-udeb to
    kFreeBSD architectures as well.

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Thu, 21 Apr 2016 17:27:45 +0000
Superseded in yakkety-release
Published in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
ntfs-3g (1:2015.3.14AR.1-1build1) xenial; urgency=medium

  * No-change rebuild for gnutls transition.

 -- Matthias Klose <email address hidden>  Wed, 17 Feb 2016 22:26:46 +0000
Superseded in xenial-release
Deleted in xenial-proposed (Reason: moved to release)
ntfs-3g (1:2015.3.14AR.1-1) unstable; urgency=low

  * New upstream release.
  * Don't run update-initramfs twice (closes: #787389).

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Tue, 01 Sep 2015 20:00:05 +0200
Superseded in wily-release
Deleted in wily-proposed (Reason: moved to release)
ntfs-3g (1:2014.2.15AR.3-1ubuntu2) wily; urgency=medium

  * SECURITY UPDATE: incomplete fix for privilege escalation issue
    - debian/patches/CVE-2015-3202.patch: changed another instance of execl
      in libfuse-lite/mount_util.c.
    - CVE-2015-3202

 -- Marc Deslauriers <email address hidden>  Wed, 27 May 2015 07:32:15 -0400
Obsolete in vivid-updates
Obsolete in vivid-security
ntfs-3g (1:2014.2.15AR.3-1ubuntu0.2) vivid-security; urgency=medium

  * SECURITY UPDATE: incomplete fix for privilege escalation issue
    - debian/patches/CVE-2015-3202.patch: changed another instance of execl
      in libfuse-lite/mount_util.c.
    - CVE-2015-3202

 -- Marc Deslauriers <email address hidden>  Wed, 27 May 2015 07:29:40 -0400
Superseded in xenial-release
Obsolete in wily-release
Deleted in wily-proposed (Reason: moved to release)
ntfs-3g (1:2014.2.15AR.3-3) unstable; urgency=high

  [ Salvatore Bonaccorso <email address hidden> ]
  * Change all relevant execl() calls to execle() to fix all possible cases
    of CVE-2015-3202 (closes: #786475).

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Tue, 26 May 2015 17:23:19 +0000
Superseded in wily-release
Deleted in wily-proposed (Reason: moved to release)
ntfs-3g (1:2014.2.15AR.3-1ubuntu1) wily; urgency=medium

  * SECURITY UPDATE: privilege escalation via insecure environment
    - debian/patches/CVE-2015-3202.patch: use execle to run external
      helpers in libfuse-lite/mount_util.c.
    - CVE-2015-3202

 -- Marc Deslauriers <email address hidden>  Fri, 22 May 2015 08:16:42 -0400
Superseded in vivid-updates
Superseded in vivid-security
ntfs-3g (1:2014.2.15AR.3-1ubuntu0.1) vivid-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via insecure environment
    - debian/patches/CVE-2015-3202.patch: use execle to run external
      helpers in libfuse-lite/mount_util.c.
    - CVE-2015-3202

 -- Marc Deslauriers <email address hidden>  Fri, 22 May 2015 08:14:37 -0400
Superseded in wily-release
Obsolete in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
ntfs-3g (1:2014.2.15AR.3-1) unstable; urgency=medium


  * New upstream release.
  * Fix FUSE fallback for old 2.6.x kernels (closes: #766911).

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Thu, 13 Nov 2014 05:43:59 +0000
Superseded in vivid-release
Deleted in vivid-proposed (Reason: moved to release)
ntfs-3g (1:2014.2.15AR.2-1) unstable; urgency=low


  * New upstream release.
  * Remove 0001-type-inconsistencies.patch and 0002-exit-values.patch , this
    release contains those.
  * Update Standards-Version to 3.9.6 .

 -- Laszlo Boszormenyi (GCS) <email address hidden>  Sun, 05 Oct 2014 09:34:12 +0000
Superseded in vivid-release
Obsolete in utopic-release
Deleted in utopic-proposed (Reason: moved to release)
ntfs-3g (1:2013.1.13AR.1-2ubuntu3) utopic; urgency=high

  * No change rebuild against gnutls28.
 -- Dimitri John Ledkov <email address hidden>   Fri, 08 Aug 2014 13:56:03 +0100
Superseded in utopic-release
Published in trusty-release
Deleted in trusty-proposed (Reason: moved to release)
ntfs-3g (1:2013.1.13AR.1-2ubuntu2) trusty; urgency=medium

  * Use dh-autoreconf to update libtool.m4 for new ports.
 -- Colin Watson <email address hidden>   Wed, 18 Dec 2013 15:25:50 +0000
Superseded in trusty-release
Obsolete in saucy-release
Deleted in saucy-proposed (Reason: moved to release)
ntfs-3g (1:2013.1.13AR.1-2ubuntu1) saucy; urgency=low

  * Merge from Debian, remaining changes:
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.

Superseded in saucy-release
Obsolete in raring-release
Deleted in raring-proposed (Reason: moved to release)
ntfs-3g (1:2013.1.13-1+0ubuntu2) raring; urgency=low

  * Make sure ntfs-3g library is installed in /lib. (LP: #1132392)
 -- Dmitrijs Ledkovs <email address hidden>   Mon, 25 Feb 2013 11:25:52 +0000
Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
ntfs-3g (1:2013.1.13-1+0ubuntu1) raring; urgency=low

  * Use a virtual package to generate tighter reverse-dependencies, as the
    soname is ever-changing. (LP: #1126547)
  * Use parallel build.
  * Acknowledge stealing debian's -1 upload version number.
  * Fix libntfs-3g.so symlink.
 -- Dmitrijs Ledkovs <email address hidden>   Sat, 16 Feb 2013 05:45:13 +0000
Superseded in raring-release
Deleted in raring-proposed (Reason: moved to release)
ntfs-3g (1:2013.1.13-1) raring; urgency=low

  * New upstream release. (LP: #1106257)

  * Use dh_autoreconf

  * Resynchronise with Debian (LP: #1118379).  Remaining changes:
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.

  * Dropped patches, applied upstream:
     - Add readonly-devices.patch: Mount read-only devices as read-only instead
       of failing.
     - ntfs-3g-junction-point-fix.patch: Return the correct type (DT_LINK) for
       NTFS Junction points, in readdir().

Published in precise-updates
Deleted in precise-proposed (Reason: moved to -updates)
ntfs-3g (1:2012.1.15AR.1-1ubuntu1.2) precise-proposed; urgency=low

  * Add readonly-devices.patch: Mount read-only devices as read-only instead
    of failing. Thanks to Jean Pierre Andre for the patch! (LP: #435192)

Superseded in raring-release
Obsolete in quantal-release
ntfs-3g (1:2012.1.15AR.5-4ubuntu3) quantal; urgency=low

  * Add readonly-devices.patch: Mount read-only devices as read-only instead
    of failing. Thanks to Jean Pierre Andre for the patch! (LP: #435192)
 -- Martin Pitt <email address hidden>   Mon, 10 Sep 2012 07:37:38 +0200
Superseded in precise-proposed
ntfs-3g (1:2012.1.15AR.1-1ubuntu1.1) precise-proposed; urgency=low

  * ntfs-3g-junction-point-fix.patch: Return the correct type (DT_LINK) for
    NTFS Junction points, in readdir(). (LP: #997391) Junction points are the
    NTFS equivalent of symlinks and should be listed as such. Fixes an
    infinite loop in baobab when scanning a Windows 7 root file system.
 -- Stefano Rivera <email address hidden>   Sat, 25 Aug 2012 22:17:25 +0200
Superseded in quantal-release
ntfs-3g (1:2012.1.15AR.5-4ubuntu2) quantal; urgency=low

  * ntfs-3g-junction-point-fix.patch: Return the correct type (DT_LINK) for
    NTFS Junction points, in readdir(). (LP: #997391)
 -- Stefano Rivera <email address hidden>   Tue, 21 Aug 2012 22:27:42 +0200
Superseded in quantal-release
ntfs-3g (1:2012.1.15AR.5-4ubuntu1) quantal; urgency=low

  * Resynchronise with Debian.  Remaining changes:
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.

Superseded in quantal-release
ntfs-3g (1:2012.1.15AR.5-2ubuntu1) quantal; urgency=low

  * Resynchronise with Debian.  Remaining changes:
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.

Superseded in quantal-release
ntfs-3g (1:2012.1.15AR.5-1ubuntu1) quantal; urgency=low

  * Resynchronise with Debian.  Remaining changes:
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.
  * Drop dependency changes only relevant for upgrades from before 12.04.

Superseded in quantal-release
Published in precise-release
ntfs-3g (1:2012.1.15AR.1-1ubuntu1) precise; urgency=low

  * Resynchronise with Debian (LP: #920545).  Remaining changes:
    - Depend on suitable versions of initramfs-tools and initscripts for
      /run support.
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.

Superseded in precise-release
ntfs-3g (1:2011.10.9AR.1-1ubuntu3) precise; urgency=low

  * Revert to gnutls26.  It looks as though we'll be sticking with that for
    precise.
 -- Colin Watson <email address hidden>   Tue, 10 Jan 2012 10:52:47 +0000
Superseded in precise-release
ntfs-3g (1:2011.10.9AR.1-1ubuntu2) precise; urgency=low

  * Switch to gnutls28.
 -- Colin Watson <email address hidden>   Fri, 06 Jan 2012 14:13:43 +0000
Superseded in precise-release
ntfs-3g (1:2011.10.9AR.1-1ubuntu1) precise; urgency=low

  * Resynchronise with Debian (LP: #892229).  Remaining changes:
    - Add an ntfs-3g-udeb package.
    - Depend on suitable versions of initramfs-tools and initscripts for
      /run support.
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.

Superseded in precise-release
ntfs-3g (1:2011.4.12AR.4-2ubuntu4) precise; urgency=low

  * Depend on fuse/fuse-udeb rather than fuse-utils/fuse-utils-udeb.  Adjust
    initramfs hook prerequisites to match.
 -- Colin Watson <email address hidden>   Fri, 25 Nov 2011 08:52:03 +0000
Superseded in precise-release
Obsolete in oneiric-release
ntfs-3g (1:2011.4.12AR.4-2ubuntu3) oneiric; urgency=low

  * Cherry-pick from 1:2011.4.12AR.6-2 (LP: #864787):
    - Correcting freudian typo in directory name when creating the
      libntfs-3g.so symlink for ntfs-3g-dev (Closes: #634755).
 -- Colin Watson <email address hidden>   Mon, 03 Oct 2011 00:03:56 +0100
Superseded in oneiric-release
ntfs-3g (1:2011.4.12AR.4-2ubuntu2) oneiric; urgency=low

  * Add ntfsresize to ntfs-3g-udeb, taking it over from ntfsprogs-udeb.
 -- Colin Watson <email address hidden>   Tue, 16 Aug 2011 16:10:18 +0100
Superseded in oneiric-release
ntfs-3g (1:2011.4.12AR.4-2ubuntu1) oneiric; urgency=low

  * Resynchronise with Debian (LP: #788368).  Remaining changes:
    - Add a ntfs-3g-udeb package.
    - Depend on suitable versions of initramfs-tools and initscripts for
      /run support.
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.

Superseded in oneiric-release
ntfs-3g (1:2011.1.15-0.1ubuntu2) oneiric; urgency=low

  * Migrate from /dev/.initramfs/varrun/sendsigs.omit to
    /run/sendsigs.omit.d/ntfs-3g.
 -- Colin Watson <email address hidden>   Fri, 15 Jul 2011 13:50:03 +0100
Superseded in oneiric-release
ntfs-3g (1:2011.1.15-0.1ubuntu1) oneiric; urgency=low

  * Resynchronise with Debian (LP: #660418).  Remaining changes:
    - Install to /bin and /lib rather than /usr/bin and /usr/lib.
    - Create libntfs3g80-udeb and ntfs-3g-udeb packages.
    - Build with external FUSE and pre-depend on fuse-utils.
    - Copy ntfs-3g into the initramfs.  If ntfs-3g is used to mount the root
      filesystem (either directly or via a loopback mount), load the fuse
      module beforehand, and save ntfs-3g's PID (indirectly) in
      /var/run/sendsigs.omit.
    - Add a symlink for the mount.ntfs manpage.
    - Accept "syncio" mount option (a synonym for "sync") for compatibility
      with older versions of Ubuntu.

Superseded in oneiric-release
Obsolete in natty-release
Obsolete in maverick-release
ntfs-3g (1:2010.8.8-0ubuntu1) maverick; urgency=low

  * New upstream release (LP: #618281).
  * Update library package name from libntfs-3g75 to libntfs-3g79.
  * Update changes/ChangeLog for latest upstream release.
 -- Colin Watson <email address hidden>   Wed, 15 Sep 2010 21:52:28 +0100
Superseded in maverick-release
Obsolete in lucid-release
ntfs-3g (1:2010.3.6-1ubuntu1) lucid; urgency=low

  * Resynchronise with Debian (LP: #513197).  Remaining changes:
    - Install to /bin and /lib rather than /usr/bin and /usr/lib.
    - Create libntfs3g75-udeb and ntfs-3g-udeb packages.
    - Build with external FUSE and pre-depend on fuse-utils.
    - Copy ntfs-3g into the initramfs.  If ntfs-3g is used to mount the root
      filesystem (either directly or via a loopback mount), load the fuse
      module beforehand, and save ntfs-3g's PID (indirectly) in
      /var/run/sendsigs.omit.
    - Add a symlink for the mount.ntfs manpage.
    - Ensure ntfs-3g flushes dirty write data back to device.  Add ntfs-3g
      mount option "syncio" which opens the underlying filesystem used by
      fuse with O_SYNC to ensure dirty write data is written back to ntfs
      immediately.  This allows us to remove the vm.dirty sysctl hacks from
      wubi.
    - Fix "no_detatch" -> "no_detach" typo in HAL fdi file.
  * Fix from upstream in 2010.3.6: Make non-resident TXF_DATA attribute of
    root directory resident so Vista and later won’t complain about RAW
    partition (LP: #514223).

Superseded in lucid-release
ntfs-3g (1:2009.4.4-1ubuntu5) lucid; urgency=low

  * debian/ntfs-3g.initramfs-bottom:
    - also guard as we do for the local-premount script, those pidofs
      costs a hundredth of a second each y'know
 -- Scott James Remnant <email address hidden>   Fri, 18 Dec 2009 02:29:46 +0000
Superseded in lucid-release
Obsolete in karmic-release
ntfs-3g (1:2009.4.4-1ubuntu4) karmic; urgency=low

  * Make syncio mount option imply sync. (Why are these separate, anyway?)

 -- Colin Watson <email address hidden>   Fri, 09 Oct 2009 12:10:45 +0100
175 of 114 results