-
cpio (2.10-1ubuntu2.1) lucid-security; urgency=medium
* SECURITY UPDATE: out of bounds write and other range issues
- Origin: upstream git commits
746f3ff670dcfcdd28fcc990e79cd6fccc7ae48d
54d1c42ac2cb91389fca04a5018ad573e4ae265a
58df4f1b44a1142bba500f980fd26806413b1728
fd262d116c4564c1796be9be2799619cf7785d07
f6a8a2cbd2d5ca40ea94900b55b845dd5ca87328
- tests/testsuite: regenerate with autom4te to incorporate
testsuite additions
- CVE-2014-9112
* SECURITY UPDATE: rmt client heap-based buffer overflow in the
rmt_read__ function
- lib/rtapelib.c: check for status too large
- Origin: http://git.savannah.gnu.org/cgit/paxutils.git/diff/lib/rtapelib.c?id=9bc39283e4cc6ab9e5913ccbf766998eab4ff093
- CVE-2010-0624
-- Steve Beattie <email address hidden> Tue, 06 Jan 2015 13:49:11 -0800
-
cpio (2.10-1ubuntu2) lucid; urgency=low
* rebuild rest of main for armel armv7/thumb2 optimization;
UbuntuSpec:mobile-lucid-arm-gcc-v7-thumb2
-- Alexander Sack <email address hidden> Fri, 05 Mar 2010 04:06:20 +0100
-
cpio (2.10-1ubuntu1) karmic; urgency=low
* Merge from debian unstable, remaining changes: LP: #390912
- debian/control: Don't build a cpio-win32 package (LP 229877).
- debian/rules: don't depend on the binary-indep target in binary.
cpio (2.10-1) unstable; urgency=low
* New upstream version.
* Bump to Standards-Version 3.8.2.
-- Bhavani Shankar <email address hidden> Tue, 23 Jun 2009 05:42:23 +0530