Rev 25 | Rev 30 | Go to most recent revision | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
| Rev 25 | Rev 29 | ||
|---|---|---|---|
| Line 1... | Line 1... | ||
| 1 | libtar (1.2.20-2) unstable; urgency=low |
1 | libtar (1.2.20-2) unstable; urgency=low |
| 2 | 2 | ||
| 3 | * no_static_buffers.patch: avoid using a static buffer in |
3 | * no_static_buffers.patch: avoid using a static buffer in |
| 4 | th_get_pathname(). Taken from upstream. Needed for no_maxpathlen.patch. |
4 | th_get_pathname(). Taken from upstream. Needed for no_maxpathlen.patch. |
| 5 | * maxpathlen.patch: Fix FTBFS on Hurd by dynamically allocating path |
5 | * no_maxpathlen.patch: Fix FTBFS on Hurd by dynamically allocating path |
| 6 | names (Closes: #657116). Thanks to Svante Signell and Petter |
6 | names (Closes: #657116). Thanks to Svante Signell and Petter |
| 7 | Reinholdtsen. |
7 | Reinholdtsen. |
| 8 | * [SECURITY] CVE-2013-4420.patch: Strip out leading slashes and any |
8 | * [SECURITY] CVE-2013-4420.patch: Strip out leading slashes and any |
| 9 | pathname prefix containing ".." components (Closes: #731860). This is |
9 | pathname prefix containing ".." components (Closes: #731860). This is |
| 10 | done in th_get_pathname() (as well as to symlink targets when |
10 | done in th_get_pathname() (as well as to symlink targets when |