Rev 25 | Rev 30 | Go to most recent revision | Show entire file | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
| Rev 25 | Rev 29 | ||
|---|---|---|---|
| Line 1... | Line 1... | ||
| 1 | libtar (1.2.20-2) unstable; urgency=low | 1 | libtar (1.2.20-2) unstable; urgency=low | 
| 2 | 2 | ||
| 3 | * no_static_buffers.patch: avoid using a static buffer in | 3 | * no_static_buffers.patch: avoid using a static buffer in | 
| 4 | th_get_pathname(). Taken from upstream. Needed for no_maxpathlen.patch. | 4 | th_get_pathname(). Taken from upstream. Needed for no_maxpathlen.patch. | 
| 5 | * maxpathlen.patch: Fix FTBFS on Hurd by dynamically allocating path | 5 | * no_maxpathlen.patch: Fix FTBFS on Hurd by dynamically allocating path | 
| 6 | names (Closes: #657116). Thanks to Svante Signell and Petter | 6 | names (Closes: #657116). Thanks to Svante Signell and Petter | 
| 7 | Reinholdtsen. | 7 | Reinholdtsen. | 
| 8 | * [SECURITY] CVE-2013-4420.patch: Strip out leading slashes and any | 8 | * [SECURITY] CVE-2013-4420.patch: Strip out leading slashes and any | 
| 9 | pathname prefix containing ".." components (Closes: #731860). This is | 9 | pathname prefix containing ".." components (Closes: #731860). This is | 
| 10 | done in th_get_pathname() (as well as to symlink targets when | 10 | done in th_get_pathname() (as well as to symlink targets when |