View Git repositories
Name Status Last Modified Last Commit
lp://staging/ubuntu/wily/cpio 1 Development 2015-05-05 15:09:00 UTC
44. * Resynchronise with Debian. Remaini...

Author: Colin Watson
Revision Date: 2013-06-02 13:01:14 UTC

* Resynchronise with Debian. Remaining changes:
  - Don't build a cpio-win32 package since mingw32 is in universe.

lp://staging/ubuntu/vivid/cpio 2 Mature 2014-10-25 21:21:32 UTC
44. * Resynchronise with Debian. Remaini...

Author: Colin Watson
Revision Date: 2013-06-02 13:01:14 UTC

* Resynchronise with Debian. Remaining changes:
  - Don't build a cpio-win32 package since mingw32 is in universe.

lp://staging/ubuntu/utopic/cpio 2 Mature 2014-04-24 15:22:27 UTC
44. * Resynchronise with Debian. Remaini...

Author: Colin Watson
Revision Date: 2013-06-02 13:01:14 UTC

* Resynchronise with Debian. Remaining changes:
  - Don't build a cpio-win32 package since mingw32 is in universe.

lp://staging/ubuntu/trusty/cpio 2 Mature 2013-10-21 02:40:38 UTC
44. * Resynchronise with Debian. Remaini...

Author: Colin Watson
Revision Date: 2013-06-02 13:01:14 UTC

* Resynchronise with Debian. Remaining changes:
  - Don't build a cpio-win32 package since mingw32 is in universe.

lp://staging/ubuntu/saucy/cpio 2 Mature 2013-06-02 12:39:01 UTC
44. * Resynchronise with Debian. Remaini...

Author: Colin Watson
Revision Date: 2013-06-02 13:01:14 UTC

* Resynchronise with Debian. Remaining changes:
  - Don't build a cpio-win32 package since mingw32 is in universe.

lp://staging/ubuntu/saucy-proposed/cpio 1 Development 2013-06-02 12:39:01 UTC
44. * Resynchronise with Debian. Remaini...

Author: Colin Watson
Revision Date: 2013-06-02 13:01:14 UTC

* Resynchronise with Debian. Remaining changes:
  - Don't build a cpio-win32 package since mingw32 is in universe.

lp://staging/ubuntu/raring-proposed/cpio bug 2 Mature 2013-01-08 09:15:17 UTC
42. * Resynchronise with Debian. Remaini...

Author: Colin Watson
Revision Date: 2013-01-08 09:15:17 UTC

* Resynchronise with Debian. Remaining changes:
  - Don't build a cpio-win32 package since mingw32 is in universe.
  - Mark cpio Multi-Arch: foreign.
  - Update config.guess and config.sub for aarch64.
  - Fix build failure with glibc 2.16.

lp://staging/ubuntu/raring/cpio 1 Development 2013-01-08 09:15:17 UTC
42. * Resynchronise with Debian. Remaini...

Author: Colin Watson
Revision Date: 2013-01-08 09:15:17 UTC

* Resynchronise with Debian. Remaining changes:
  - Don't build a cpio-win32 package since mingw32 is in universe.
  - Mark cpio Multi-Arch: foreign.
  - Update config.guess and config.sub for aarch64.
  - Fix build failure with glibc 2.16.

lp://staging/ubuntu/quantal/cpio 1 Development 2012-10-01 12:56:42 UTC
39. Update config.guess,sub for aarch64

Author: Wookey
Revision Date: 2012-10-01 12:56:42 UTC

Update config.guess,sub for aarch64

lp://staging/ubuntu/quantal-proposed/cpio 2 Mature 2012-06-27 21:46:48 UTC
38. * Merge from Debian unstable, remaini...

Author: Steve Langasek
Revision Date: 2012-06-27 14:10:00 UTC

* Merge from Debian unstable, remaining changes:
  - debian/control: Don't build a cpio-win32 package since mingw32
    is in universe.
  - debian/rules: Don't depend on the binary-indep target in binary.
  - Build-depend on gettext:any instead of on gettext.
* Dropped changes, included in Debian:
  - debian/patches/627444-cross-compiling.patch: fix cross-building
    support.
  - debian/rules: use the host-arch strip when cross-compiling, so we don't
    have to rely on support in binutils-multiarch.

lp://staging/ubuntu/precise/cpio 2 Mature 2012-04-01 18:07:31 UTC
35. releasing version 2.11-7ubuntu3

Author: Steve Langasek
Revision Date: 2012-04-01 18:07:31 UTC

releasing version 2.11-7ubuntu3

lp://staging/ubuntu/oneiric/cpio 2 Mature 2011-04-28 14:29:18 UTC
30. * Merge from debian unstable (LP: #72...

Author: Bhavani Shankar
Revision Date: 2011-02-23 18:10:47 UTC

* Merge from debian unstable (LP: #723742). Remaining changes:
  - debian/control: Don't build a cpio-win32 package since mingw32
    is in universe.
  - debian/rules: Don't depend on the binary-indep target in binary.

lp://staging/~peter-pearse/ubuntu/natty/cpio/bug001 1 Development 2011-04-20 08:21:46 UTC
31. Patch to solve lsts/stat redefinitions.

Author: Peter Pearse
Revision Date: 2011-04-20 08:20:40 UTC

Patch to solve lsts/stat redefinitions.

lp://staging/ubuntu/natty/cpio bug 2 Mature 2011-02-23 18:17:32 UTC
30. * Merge from debian unstable (LP: #72...

Author: Bhavani Shankar
Revision Date: 2011-02-23 18:10:47 UTC

* Merge from debian unstable (LP: #723742). Remaining changes:
  - debian/control: Don't build a cpio-win32 package since mingw32
    is in universe.
  - debian/rules: Don't depend on the binary-indep target in binary.

lp://staging/ubuntu/maverick/cpio bug 2 Mature 2010-06-16 05:46:18 UTC
27. releasing version 2.11-4ubuntu1

Author: Steve Langasek
Revision Date: 2010-06-16 05:46:18 UTC

releasing version 2.11-4ubuntu1

lp://staging/ubuntu/lucid/cpio bug 1 Development 2010-03-05 04:06:20 UTC
24. rebuild rest of main for armel armv7/...

Author: Alexander Sack
Revision Date: 2010-03-05 04:06:20 UTC

rebuild rest of main for armel armv7/thumb2 optimization;
UbuntuSpec:mobile-lucid-arm-gcc-v7-thumb2

lp://staging/ubuntu/gutsy-security/cpio bug 1 Development 2009-12-05 06:15:26 UTC
16. * SECURITY UPDATE: Buffer overflow in...

Author: Jamie Strandboge
Revision Date: 2008-09-29 16:58:13 UTC

* SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
  cpio has unspecified attack vectors and impact, resulting in a "crashing
  stack."
* patch paxnames.c to correct an allocation weakness in safer_name_suffix()
  which could lead to a crash. Thanks to Stephan Hermann
* References:
  CVE-2007-4476
  LP: #161173

lp://staging/ubuntu/karmic/cpio 2 Mature 2009-12-05 06:14:58 UTC
23. * Merge from debian unstable, remaini...

Author: Bhavani Shankar
Revision Date: 2009-06-23 05:42:23 UTC

* Merge from debian unstable, remaining changes: LP: #390912
  - debian/control: Don't build a cpio-win32 package (LP 229877).
  - debian/rules: don't depend on the binary-indep target in binary.

lp://staging/ubuntu/jaunty/cpio 2 Mature 2009-12-05 06:14:46 UTC
21. * Merge from debian unstable, remaini...

Author: Kees Cook
Revision Date: 2009-02-15 09:00:31 UTC

* Merge from debian unstable, remaining changes:
  - debian/control: Don't build a cpio-win32 package (LP 229877).
  - debian/rules: don't depend on the binary-indep target in binary.

lp://staging/ubuntu/intrepid/cpio 2 Mature 2009-12-05 06:14:38 UTC
19. * Make sure that HAVE_GETPWNAM, HAVE_...

Author: James Westby
Revision Date: 2008-09-25 20:47:23 UTC

* Make sure that HAVE_GETPWNAM, HAVE_GETGRNAM, HAVE_GETPWUID and
  HAVE_GETGRGID are defined so that the real functions are used, rather
  than dummy ones. Having HAVE_GETPWNAM defined makes --owner work with
  user and group names again. (LP: #273259)
  - Also switch lib/system.h to use HAVE_GETPWUID instead of HAVE_PWUID.

lp://staging/ubuntu/hardy/cpio 2 Mature 2009-12-05 06:14:21 UTC
16. * Merge from debian unstable, remaini...

Author: Michael Vogt
Revision Date: 2007-11-13 10:50:05 UTC

* Merge from debian unstable, remaining changes:
  - Build with -fgnu89-inline to build with gcc-4.3
  - Set Ubuntu maintainer address.

lp://staging/ubuntu/feisty-security/cpio bug 1 Development 2009-12-05 06:14:18 UTC
11. * SECURITY UPDATE: Buffer overflow in...

Author: Jamie Strandboge
Revision Date: 2008-09-29 16:58:13 UTC

* SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
  cpio has unspecified attack vectors and impact, resulting in a "crashing
  stack."
* src/copyin.c: patch copyin.c to correct an allocation weakness in
  safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
* References:
  CVE-2007-4476
  LP: #161173

lp://staging/ubuntu/gutsy-updates/cpio 1 Development 2009-12-05 06:14:12 UTC
16. * SECURITY UPDATE: Buffer overflow in...

Author: Jamie Strandboge
Revision Date: 2008-09-29 16:58:13 UTC

* SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
  cpio has unspecified attack vectors and impact, resulting in a "crashing
  stack."
* patch paxnames.c to correct an allocation weakness in safer_name_suffix()
  which could lead to a crash. Thanks to Stephan Hermann
* References:
  CVE-2007-4476
  LP: #161173

lp://staging/ubuntu/gutsy/cpio 1 Development 2009-12-05 06:13:50 UTC
15. src/copyin.c: Applied patch from Dave...

Author: Daniel Hahler
Revision Date: 2007-10-02 04:54:51 UTC

src/copyin.c: Applied patch from Dave Gilbert inline to fix
possible segfault when fixing headers, where the magic number
is byte swapped (LP: #139928)

lp://staging/ubuntu/feisty-updates/cpio 1 Development 2009-12-05 06:13:35 UTC
11. * SECURITY UPDATE: Buffer overflow in...

Author: Jamie Strandboge
Revision Date: 2008-09-29 16:58:13 UTC

* SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
  cpio has unspecified attack vectors and impact, resulting in a "crashing
  stack."
* src/copyin.c: patch copyin.c to correct an allocation weakness in
  safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
* References:
  CVE-2007-4476
  LP: #161173

lp://staging/ubuntu/dapper-security/cpio bug 2 Mature 2009-12-05 06:13:15 UTC
5. * SECURITY UPDATE: Buffer overflow in...

Author: Jamie Strandboge
Revision Date: 2008-09-29 16:58:13 UTC

* SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
  cpio has unspecified attack vectors and impact, resulting in a "crashing
  stack."
* src/copyin.c: patch copyin.c to correct an allocation weakness in
  safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
* References:
  CVE-2007-4476
  LP: #161173

lp://staging/ubuntu/feisty/cpio 1 Development 2009-12-05 06:13:05 UTC
10. Fix setlocale glitch. closes: #381348.

Author: Clint Adams
Revision Date: 2006-08-04 09:45:10 UTC

Fix setlocale glitch. closes: #381348.

lp://staging/ubuntu/edgy/cpio 1 Development 2009-12-05 06:12:53 UTC
10. Fix setlocale glitch. closes: #381348.

Author: Clint Adams
Revision Date: 2006-08-04 09:45:10 UTC

Fix setlocale glitch. closes: #381348.

lp://staging/ubuntu/dapper-updates/cpio 2 Mature 2009-12-05 06:12:41 UTC
5. * SECURITY UPDATE: Buffer overflow in...

Author: Jamie Strandboge
Revision Date: 2008-09-29 16:58:13 UTC

* SECURITY UPDATE: Buffer overflow in the safer_name_suffix function in GNU
  cpio has unspecified attack vectors and impact, resulting in a "crashing
  stack."
* src/copyin.c: patch copyin.c to correct an allocation weakness in
  safer_name_suffix() which could lead to a crash. Thanks to Stephan Hermann
* References:
  CVE-2007-4476
  LP: #161173

lp://staging/ubuntu/dapper-proposed/cpio 2 Mature 2009-12-05 06:12:23 UTC
5. Fix setlocale glitch. (Closes Ubuntu:...

Author: Fabio Massimo Di Nitto
Revision Date: 2006-09-29 09:33:55 UTC

Fix setlocale glitch.
(Closes Ubuntu: #59228)

lp://staging/ubuntu/dapper/cpio 2 Mature 2009-12-05 06:11:39 UTC
4. Fix potential buffer overflow on 64-b...

Author: Clint Adams
Revision Date: 2005-12-20 12:44:50 UTC

Fix potential buffer overflow on 64-bit architectures.
[CVE-2005-4268]. closes: #344134.

lp://staging/ubuntu/breezy-security/cpio 1 Development 2009-12-05 06:11:15 UTC
4. * SECURITY UPDATE: Local buffer overf...

Author: Martin Pitt
Revision Date: 2006-01-02 17:59:57 UTC

* SECURITY UPDATE: Local buffer overflow.
* copyout.c, write_out_header(): Check for and abort on ascii_header buffer
  overflow that occurs with extreme values of file properties (like file
  sizes).
* CVE-2005-4268

lp://staging/ubuntu/breezy/cpio 1 Development 2009-12-05 06:10:56 UTC
3. * SECURITY UPDATE: Modify permissions...

Author: Martin Pitt
Revision Date: 2005-09-29 12:04:52 UTC

* SECURITY UPDATE: Modify permissions of arbitrary files, path traversal.
* copyin.c, copypass.c: Use fchmod() and fchown() before closing the output
  file instead of chmod() and chown() after closing it. This avoids
  exploiting this race condition with a hardlink attach to chmod/chown
  arbitrary files. [CAN-2005-1111]
* copyin.c: Separate out path sanitizing to safer_name_suffix(): Apart from
  leading slashes, filter out ".." components from output file names if
  --no-absolute-filenames is given, to avoid path traversal. [CAN-2005-1229]

lp://staging/ubuntu/hoary-security/cpio 1 Development 2009-12-05 06:10:29 UTC
5. * SECURITY UPDATE: Local buffer overf...

Author: Martin Pitt
Revision Date: 2006-01-02 18:09:59 UTC

* SECURITY UPDATE: Local buffer overflow.
* copyout.c, write_out_header(): Check for and abort on ascii_header buffer
  overflow that occurs with extreme values of file properties (like file
  sizes).
* CVE-2005-4268

lp://staging/ubuntu/hoary/cpio 1 Development 2009-12-05 06:10:07 UTC
3. * SECURITY UPDATE: Fix creation of wo...

Author: Martin Pitt
Revision Date: 2005-02-04 10:28:24 UTC

* SECURITY UPDATE: Fix creation of world-writeable files.
* main.c: Do not create output file with 0666 with -O <archive>, but respect
  the current umask.
* Thanks to Martin Schulze for the patch.
* References:
  CAN-1999-1572

lp://staging/ubuntu/warty-security/cpio 1 Development 2009-12-05 06:09:44 UTC
4. * SECURITY UPDATE: Local buffer overf...

Author: Martin Pitt
Revision Date: 2006-01-02 18:18:32 UTC

* SECURITY UPDATE: Local buffer overflow.
* copyout.c, write_out_header(): Check for and abort on ascii_header buffer
  overflow that occurs with extreme values of file properties (like file
  sizes).
* CVE-2005-4268

lp://staging/ubuntu/warty/cpio 1 Development 2009-12-05 06:09:15 UTC
2. * Non-maintainer upload according to ...

Author: Roland Mas
Revision Date: 2003-08-23 16:07:05 UTC

* Non-maintainer upload according to the release manager's plan.
* Fix LSB 1.3 non-compliance (Closes: Bug#184887).

137 of 37 results