Rev |
Age |
Author |
Path |
Log message |
Diff |
Changes |
33 |
3751d 09h |
magnus |
/trunk/debian/ |
th_get_size-unsigned-int.patch: Make the th_get_size() macro cast the
result from oct_to_int() to unsigned int. This is the right fix for
bug #725938 on 64-bit systems, where a specially crafted tar file
would not cause an integer overflow, but a memory allocation of almost
16 exbibytes, which would certainly fail outright without harm. |
|
/trunk/debian/patches/th_get_size-unsigned-int.patch
/trunk/debian/changelog<br/>/trunk/debian/patches/series
|
32 |
3751d 10h |
magnus |
/trunk/debian/patches/ |
Add stdlib.h for malloc() in lib/decode.c |
|
/trunk/debian/patches/CVE-2013-4420.patch<br/>/trunk/debian/patches/no_maxpathlen.patch<br/>/trunk/debian/patches/no_static_buffers.patch
|
31 |
3751d 10h |
magnus |
/trunk/debian/ |
[SECURITY] CVE-2013-4420.patch: When the prefix field is in use, the
safer_name_suffix() function should certainly be applied to the
combination of it and the name field, not just on the name field. |
|
/trunk/debian/changelog<br/>/trunk/debian/patches/CVE-2013-4420.patch
|
30 |
3751d 10h |
magnus |
/trunk/debian/ |
no_maxpathlen.patch: Fix two grave bugs in the patch. First,
th_get_pathname would only allocate as much memory as was needed for
the first filename encountered, causing heap corruption when/if
encountering longer filenames later. Second, two variables were mixed
up in tar_append_tree(). Also, fix a potential memory leak and trim
the patch a bit. |
|
/trunk/debian/changelog<br/>/trunk/debian/patches/no_maxpathlen.patch
|
29 |
3751d 10h |
magnus |
/trunk/debian/ |
Correct patch name in changelog. |
|
/trunk/debian/changelog
|
28 |
3751d 11h |
magnus |
/tags/1.2.16-1+deb7u1/ |
[svn-buildpackage] Tagging libtar 1.2.16-1+deb7u1 |
|
/tags/1.2.16-1+deb7u1<br/>/tags/1.2.16-1+deb7u1/debian/patches/size_t-overflow_cve-2013-4397.patch
|
27 |
3751d 11h |
magnus |
/branches/wheezy/debian/ |
[SECURITY] size_t-overflow_cve-2013-4397.patch: Fix CVE-2013-4397:
Integer overflow (Closes: #725938). |
|
/branches/wheezy/debian/patches/size_t-overflow_cve-2013-4397.patch
/branches/wheezy/debian/changelog<br/>/branches/wheezy/debian/patches/series
|
26 |
3751d 11h |
magnus |
/tags/1.2.20-2/ |
[svn-buildpackage] Tagging libtar 1.2.20-2 |
|
/tags/1.2.20-2<br/>/tags/1.2.20-2/debian/patches/CVE-2013-4420.patch<br/>/tags/1.2.20-2/debian/patches/no_maxpathlen.patch<br/>/tags/1.2.20-2/debian/patches/no_static_buffers.patch<br/>/tags/1.2.20-2/debian/patches/series
|
25 |
3751d 11h |
magnus |
/trunk/debian/ |
Bump Standards-Version to 3.9.5. |
|
/trunk/debian/changelog<br/>/trunk/debian/control
|
24 |
3751d 11h |
magnus |
/trunk/debian/ |
[SECURITY] CVE-2013-4420.patch: Strip out leading slashes and any
pathname prefix containing ".." components (Closes: #731860). This is
done in th_get_pathname() (as well as to symlink targets when
extracting symlinks), not merely when extracting files, which means
applications calling that function will not see the stored
filename. There is no way to disable this behaviour, but it can be
expected that one will be provided when the issue is solved upstream. |
|
/trunk/debian/patches/CVE-2013-4420.patch
/trunk/debian/changelog<br/>/trunk/debian/patches/series
|
23 |
3753d 12h |
magnus |
/trunk/debian/ |
* no_static_buffers.patch: avoid using a static buffer in
th_get_pathname(). Taken from upstream. Needed for no_maxpathlen.patch.
* maxpathlen.patch: Fix FTBFS on Hurd by dynamically allocating path
names (Closes: #657116). Thanks to Svante Signell and Petter
Reinholdtsen. |
|
/trunk/debian/patches/no_maxpathlen.patch<br/>/trunk/debian/patches/no_static_buffers.patch<br/>/trunk/debian/patches/series
/trunk/debian/changelog
|
22 |
3879d 14h |
magnus |
/tags/1.2.20-1/ |
[svn-buildpackage] Tagging libtar 1.2.20-1 |
|
/tags/1.2.20-1
/tags/1.2.20-1/debian/patches/autoreconf.patch<br/>/tags/1.2.20-1/debian/patches/bad_ptrtoint.patch<br/>/tags/1.2.20-1/debian/patches/libtool.patch<br/>/tags/1.2.20-1/debian/patches/man_hyphen_minus.patch<br/>/tags/1.2.20-1/debian/patches/memleak.patch<br/>/tags/1.2.20-1/debian/patches/memleak2.patch<br/>/tags/1.2.20-1/debian/patches/series
|
21 |
3879d 15h |
magnus |
/branches/wheezy/ |
Create wheezy branch |
|
/branches/wheezy
|
20 |
3879d 15h |
magnus |
/branches/ |
Create branches directory |
|
/branches
|
19 |
3879d 15h |
magnus |
/trunk/debian/ |
Bump Standards-Version to 3.9.4. |
|
/trunk/debian/changelog<br/>/trunk/debian/control
|
18 |
3879d 15h |
magnus |
/trunk/debian/ |
[SECURITY] New upstream release. Fixes CVE-2013-4397: Integer
overflow (Closes: #725938). |
|
/trunk/debian/changelog
|
17 |
4037d 10h |
magnus |
/tags/1.2.19-1/ |
[svn-buildpackage] Tagging libtar 1.2.19-1 |
|
/tags/1.2.19-1
/tags/1.2.19-1/debian/patches/autoreconf.patch<br/>/tags/1.2.19-1/debian/patches/bad_ptrtoint.patch<br/>/tags/1.2.19-1/debian/patches/libtool.patch<br/>/tags/1.2.19-1/debian/patches/man_hyphen_minus.patch<br/>/tags/1.2.19-1/debian/patches/memleak.patch<br/>/tags/1.2.19-1/debian/patches/memleak2.patch<br/>/tags/1.2.19-1/debian/patches/series
|
16 |
4037d 16h |
magnus |
/trunk/debian/patches/ |
Delete the patch series again. |
|
/trunk/debian/patches/series
|
15 |
4037d 16h |
magnus |
/trunk/debian/ |
New upstream release. |
|
/trunk/debian/changelog<br/>/trunk/debian/patches/series
|
14 |
4354d 09h |
magnus |
/tags/1.2.16-1/ |
[svn-buildpackage] Tagging libtar 1.2.16-1 |
|
/tags/1.2.16-1
/tags/1.2.16-1/debian/patches/autoreconf.patch<br/>/tags/1.2.16-1/debian/patches/bad_ptrtoint.patch<br/>/tags/1.2.16-1/debian/patches/libtool.patch<br/>/tags/1.2.16-1/debian/patches/man_hyphen_minus.patch<br/>/tags/1.2.16-1/debian/patches/memleak.patch<br/>/tags/1.2.16-1/debian/patches/memleak2.patch
|