Subversion Repositories

?revision_form?
Rev ?revision_input??revision_submit?
?revision_endform?

Go to most recent revision | Hide changed files | Directory listing | RSS feed

Filtering Options

Rev Age Author Path Log message Diff Changes
44 2858d 03h magnus /trunk/debian/ Bump Standards-Version to 3.9.8.  
/trunk/debian/changelog<br/>/trunk/debian/control
43 2858d 03h magnus /trunk/debian/ Drop libtar/Makefile from examples, since it makes the build
unreproducible (saves $SHELL) and isn't enough to compile libtar.c
anyway.
 
/trunk/debian/changelog<br/>/trunk/debian/libtar-dev.examples
42 2987d 05h magnus /tags/1.2.20-5/ [svn-buildpackage] Tagging libtar 1.2.20-5  
/tags/1.2.20-5<br/>/tags/1.2.20-5/debian/patches/oldgnu_prefix.patch<br/>/tags/1.2.20-5/debian/patches/testsuite.patch
41 2987d 06h magnus /trunk/debian/ Bump Standards-Version to 3.9.7.  
/trunk/debian/changelog<br/>/trunk/debian/control
40 2987d 06h magnus /trunk/debian/ Don't bother checking for zlib, which is only used by the example binary (libtar).  
/trunk/debian/rules
39 2987d 06h magnus /trunk/debian/ testsuite.patch: Add a simple test (Closes: #737258).  
/trunk/debian/patches/testsuite.patch
/trunk/debian/changelog<br/>/trunk/debian/patches/series
38 3517d 04h magnus /trunk/debian/ oldgnu_prefix.patch: Detect old-style GNU headers correctly (Closes:
#763119). Those appear in incremental archives and use the bytes that
the new-style headers use for the prefix field for other fields.
Thanks to Steinar H. Gunderson.
 
/trunk/debian/patches/oldgnu_prefix.patch
/trunk/debian/changelog<br/>/trunk/debian/patches/series
37 3679d 05h magnus /tags/1.2.20-4/ [svn-buildpackage] Tagging libtar 1.2.20-4  
/tags/1.2.20-4
36 3679d 05h magnus /trunk/debian/ no_maxpathlen.patch: Half of the part of the patch modifying
compat/dirname.c was missing, causing libtar's dirname to always
return NULL (except in special circumstances). Actually make it work
(Closes: #745352). (The reason that libtar doesn't use libc's
dirname() and basename() on some or most platforms is that the code
doesn't work with destructive versions of these functions).
 
/trunk/debian/changelog<br/>/trunk/debian/patches/no_maxpathlen.patch
35 3755d 06h magnus /branches/wheezy/debian/ [SECURITY] CVE-2013-4420.patch: Strip out leading slashes and any
pathname prefix containing ".." components (Closes: #731860). This is
done in th_get_pathname() (as well as to symlink targets when
extracting symlinks), not merely when extracting files, which means
applications calling that function will not see the stored
filename. There is no way to disable this behaviour, but it can be
expected that one will be provided when the issue is solved upstream.
 
/branches/wheezy/debian/patches/CVE-2013-4420.patch
/branches/wheezy/debian/changelog<br/>/branches/wheezy/debian/patches/series
34 3756d 01h magnus /tags/1.2.20-3/ [svn-buildpackage] Tagging libtar 1.2.20-3  
/tags/1.2.20-3<br/>/tags/1.2.20-3/debian/patches/CVE-2013-4420.patch<br/>/tags/1.2.20-3/debian/patches/no_maxpathlen.patch<br/>/tags/1.2.20-3/debian/patches/no_static_buffers.patch<br/>/tags/1.2.20-3/debian/patches/series<br/>/tags/1.2.20-3/debian/patches/th_get_size-unsigned-int.patch
33 3756d 01h magnus /trunk/debian/ th_get_size-unsigned-int.patch: Make the th_get_size() macro cast the
result from oct_to_int() to unsigned int. This is the right fix for
bug #725938 on 64-bit systems, where a specially crafted tar file
would not cause an integer overflow, but a memory allocation of almost
16 exbibytes, which would certainly fail outright without harm.
 
/trunk/debian/patches/th_get_size-unsigned-int.patch
/trunk/debian/changelog<br/>/trunk/debian/patches/series
32 3756d 01h magnus /trunk/debian/patches/ Add stdlib.h for malloc() in lib/decode.c  
/trunk/debian/patches/CVE-2013-4420.patch<br/>/trunk/debian/patches/no_maxpathlen.patch<br/>/trunk/debian/patches/no_static_buffers.patch
31 3756d 02h magnus /trunk/debian/ [SECURITY] CVE-2013-4420.patch: When the prefix field is in use, the
safer_name_suffix() function should certainly be applied to the
combination of it and the name field, not just on the name field.
 
/trunk/debian/changelog<br/>/trunk/debian/patches/CVE-2013-4420.patch
30 3756d 02h magnus /trunk/debian/ no_maxpathlen.patch: Fix two grave bugs in the patch. First,
th_get_pathname would only allocate as much memory as was needed for
the first filename encountered, causing heap corruption when/if
encountering longer filenames later. Second, two variables were mixed
up in tar_append_tree(). Also, fix a potential memory leak and trim
the patch a bit.
 
/trunk/debian/changelog<br/>/trunk/debian/patches/no_maxpathlen.patch
29 3756d 02h magnus /trunk/debian/ Correct patch name in changelog.  
/trunk/debian/changelog
28 3756d 03h magnus /tags/1.2.16-1+deb7u1/ [svn-buildpackage] Tagging libtar 1.2.16-1+deb7u1  
/tags/1.2.16-1+deb7u1<br/>/tags/1.2.16-1+deb7u1/debian/patches/size_t-overflow_cve-2013-4397.patch
27 3756d 03h magnus /branches/wheezy/debian/ [SECURITY] size_t-overflow_cve-2013-4397.patch: Fix CVE-2013-4397:
Integer overflow (Closes: #725938).
 
/branches/wheezy/debian/patches/size_t-overflow_cve-2013-4397.patch
/branches/wheezy/debian/changelog<br/>/branches/wheezy/debian/patches/series
26 3756d 03h magnus /tags/1.2.20-2/ [svn-buildpackage] Tagging libtar 1.2.20-2  
/tags/1.2.20-2<br/>/tags/1.2.20-2/debian/patches/CVE-2013-4420.patch<br/>/tags/1.2.20-2/debian/patches/no_maxpathlen.patch<br/>/tags/1.2.20-2/debian/patches/no_static_buffers.patch<br/>/tags/1.2.20-2/debian/patches/series
25 3756d 03h magnus /trunk/debian/ Bump Standards-Version to 3.9.5.  
/trunk/debian/changelog<br/>/trunk/debian/control

Show All