View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/rsync
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2018-07-26 22:49:29 UTC 2018-07-26
DSC file for 3.1.2-2.2

Author: Ubuntu Git Importer
Author Date: 2018-07-26 22:49:29 UTC

DSC file for 3.1.2-2.2

importer/debian/dsc 2018-07-24 16:41:07 UTC 2018-07-24
DSC file for 3.1.2-2.2

Author: Ubuntu Git Importer
Author Date: 2018-07-24 16:41:07 UTC

DSC file for 3.1.2-2.2

ubuntu/disco 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-unapplied version 3.1.2-2.2 to debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-unapplied version 3.1.2-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

debian/buster 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-unapplied version 3.1.2-2.2 to debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-unapplied version 3.1.2-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

applied/ubuntu/devel 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 67e256daa010553caa85416424606833fcd5c0b3

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

applied/debian/sid 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 67e256daa010553caa85416424606833fcd5c0b3

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

ubuntu/cosmic 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-unapplied version 3.1.2-2.2 to debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-unapplied version 3.1.2-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

applied/ubuntu/cosmic-proposed 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 67e256daa010553caa85416424606833fcd5c0b3

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

applied/ubuntu/disco 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 67e256daa010553caa85416424606833fcd5c0b3

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

applied/ubuntu/cosmic-devel 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 67e256daa010553caa85416424606833fcd5c0b3

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

applied/debian/buster 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 67e256daa010553caa85416424606833fcd5c0b3

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

ubuntu/cosmic-proposed 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-unapplied version 3.1.2-2.2 to debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-unapplied version 3.1.2-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

ubuntu/disco-devel 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-unapplied version 3.1.2-2.2 to debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-unapplied version 3.1.2-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

applied/ubuntu/disco-devel 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 67e256daa010553caa85416424606833fcd5c0b3

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

debian/sid 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-unapplied version 3.1.2-2.2 to debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-unapplied version 3.1.2-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

ubuntu/devel 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-unapplied version 3.1.2-2.2 to debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-unapplied version 3.1.2-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

ubuntu/cosmic-devel 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-unapplied version 3.1.2-2.2 to debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-unapplied version 3.1.2-2.2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

applied/ubuntu/cosmic 2018-07-21 22:38:21 UTC 2018-07-21
Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Author: YunQiang Su
Author Date: 2018-07-21 13:44:31 UTC

Import patches-applied version 3.1.2-2.2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 67e256daa010553caa85416424606833fcd5c0b3

New changelog entries:
  * Non-maintainer upload.
  * Ignore --protect-args when already sent by client
    (CVE-2018-5764) (Closes: #887588)
  [Helmut Grohne]
  * Fix Architecture field of cross built packages. (Closes: #866353)
  [Aurelien Jarno]
  * Update config.guess for new ports: mips*r6* and riscv64.
    (Closes: #892968, #883048)

debian/jessie 2018-06-23 17:27:33 UTC 2018-06-23
Import patches-unapplied version 3.1.1-3+deb8u1 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2017-12-10 13:08:49 UTC

Import patches-unapplied version 3.1.1-3+deb8u1 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Enforce trailing \0 when receiving xattr name values (CVE-2017-16548)
    (Closes: #880954)
  * Check fname in recv_files sooner (CVE-2017-17433) (Closes: #883667)
  * Sanitize xname in read_ndx_and_attrs (CVE-2017-17434) (Closes: #883665)
  * Check daemon filter against fnamecmp in recv_files() (CVE-2017-17434)
    (Closes: #883665)

applied/debian/jessie 2018-06-23 17:27:33 UTC 2018-06-23
Import patches-applied version 3.1.1-3+deb8u1 to applied/debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2017-12-10 13:08:49 UTC

Import patches-applied version 3.1.1-3+deb8u1 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 5f8443ec337a2e95d399483940a439bee44b0f19

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Enforce trailing \0 when receiving xattr name values (CVE-2017-16548)
    (Closes: #880954)
  * Check fname in recv_files sooner (CVE-2017-17433) (Closes: #883667)
  * Sanitize xname in read_ndx_and_attrs (CVE-2017-17434) (Closes: #883665)
  * Check daemon filter against fnamecmp in recv_files() (CVE-2017-17434)
    (Closes: #883665)

applied/debian/stretch 2018-03-10 17:04:53 UTC 2018-03-10
Import patches-applied version 3.1.2-1+deb9u1 to applied/debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2017-12-10 12:57:17 UTC

Import patches-applied version 3.1.2-1+deb9u1 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 69de4ef1cba505ccef56068d2f1c788f32c0087e
Unapplied parent: 4a919095132669800103370ceb60b70042156e43

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Enforce trailing \0 when receiving xattr name values (CVE-2017-16548)
    (Closes: #880954)
  * Check fname in recv_files sooner (CVE-2017-17433) (Closes: #883667)
  * Sanitize xname in read_ndx_and_attrs (CVE-2017-17434) (Closes: #883665)
  * Check daemon filter against fnamecmp in recv_files() (CVE-2017-17434)
    (Closes: #883665)

debian/stretch 2018-03-10 17:04:53 UTC 2018-03-10
Import patches-unapplied version 3.1.2-1+deb9u1 to debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2017-12-10 12:57:17 UTC

Import patches-unapplied version 3.1.2-1+deb9u1 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: f3c9833cf7f7d6ee3f547e66ba0d01a49788f95b

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Enforce trailing \0 when receiving xattr name values (CVE-2017-16548)
    (Closes: #880954)
  * Check fname in recv_files sooner (CVE-2017-17433) (Closes: #883667)
  * Sanitize xname in read_ndx_and_attrs (CVE-2017-17434) (Closes: #883665)
  * Check daemon filter against fnamecmp in recv_files() (CVE-2017-17434)
    (Closes: #883665)

importer/ubuntu/pristine-tar 2018-03-06 07:50:53 UTC 2018-03-06
pristine-tar data for rsync_3.1.2.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-03-06 07:50:53 UTC

pristine-tar data for rsync_3.1.2.orig.tar.gz

importer/debian/pristine-tar 2018-03-06 07:33:42 UTC 2018-03-06
pristine-tar data for rsync_3.1.2.orig.tar.gz

Author: Ubuntu Git Importer
Author Date: 2018-03-06 07:33:42 UTC

pristine-tar data for rsync_3.1.2.orig.tar.gz

applied/ubuntu/bionic-devel 2018-02-23 15:39:02 UTC 2018-02-23
Import patches-applied version 3.1.2-2.1ubuntu1 to applied/ubuntu/bionic-prop...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 21:09:34 UTC

Import patches-applied version 3.1.2-2.1ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 9d30db948107e5372c107b5b2657dd37df932db1

New changelog entries:
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/bionic-devel 2018-02-23 15:39:02 UTC 2018-02-23
Import patches-unapplied version 3.1.2-2.1ubuntu1 to ubuntu/bionic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 21:09:34 UTC

Import patches-unapplied version 3.1.2-2.1ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/bionic 2018-02-23 15:39:02 UTC 2018-02-23
Import patches-applied version 3.1.2-2.1ubuntu1 to applied/ubuntu/bionic-prop...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 21:09:34 UTC

Import patches-applied version 3.1.2-2.1ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 9d30db948107e5372c107b5b2657dd37df932db1

New changelog entries:
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/bionic 2018-02-23 15:39:02 UTC 2018-02-23
Import patches-unapplied version 3.1.2-2.1ubuntu1 to ubuntu/bionic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 21:09:34 UTC

Import patches-unapplied version 3.1.2-2.1ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/bionic-proposed 2018-02-23 15:39:02 UTC 2018-02-23
Import patches-applied version 3.1.2-2.1ubuntu1 to applied/ubuntu/bionic-prop...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 21:09:34 UTC

Import patches-applied version 3.1.2-2.1ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 31a2e1c6e9bf2af8c3be51a89b723abd97187f0e
Unapplied parent: 9d30db948107e5372c107b5b2657dd37df932db1

New changelog entries:
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/bionic-proposed 2018-02-23 15:39:02 UTC 2018-02-23
Import patches-unapplied version 3.1.2-2.1ubuntu1 to ubuntu/bionic-proposed

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 21:09:34 UTC

Import patches-unapplied version 3.1.2-2.1ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 0f0bdc737c55de5eabffb59d33a4d71b5793c2e2

New changelog entries:
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/artful-security 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.2-2ubuntu0.2 to applied/ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:34:53 UTC

Import patches-applied version 3.1.2-2ubuntu0.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 83adfe9f4b3395e9abb8b0a03b9d88ff8f523c60
Unapplied parent: b25828c63496e2e621d906566c4ba7410d5b2b16

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/xenial-updates 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.1-3ubuntu1.2 to applied/ubuntu/xenial-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:27:59 UTC

Import patches-applied version 3.1.1-3ubuntu1.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3e6b338540910599c6e151b153f60e652a99b69a
Unapplied parent: 3b7ec6648d1250384e8afd80e286a39e1fac2f2c

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/artful-updates 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.2-2ubuntu0.2 to applied/ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:34:53 UTC

Import patches-applied version 3.1.2-2ubuntu0.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 83adfe9f4b3395e9abb8b0a03b9d88ff8f523c60
Unapplied parent: b25828c63496e2e621d906566c4ba7410d5b2b16

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/trusty-security 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.0-2ubuntu0.4 to ubuntu/trusty-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:00:13 UTC

Import patches-unapplied version 3.1.0-2ubuntu0.4 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7f4a4f397373ca45d28737868b65757f4dced775

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/artful-security 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.2-2ubuntu0.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:34:53 UTC

Import patches-unapplied version 3.1.2-2ubuntu0.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a9e525e4d603906d93c0e26dc21179964e728b63

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/xenial-updates 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.1-3ubuntu1.2 to ubuntu/xenial-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:27:59 UTC

Import patches-unapplied version 3.1.1-3ubuntu1.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 7067af89a5ddf713b9b4857f3936e1e68f74c773

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/xenial-devel 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.1-3ubuntu1.2 to applied/ubuntu/xenial-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:27:59 UTC

Import patches-applied version 3.1.1-3ubuntu1.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3e6b338540910599c6e151b153f60e652a99b69a
Unapplied parent: 3b7ec6648d1250384e8afd80e286a39e1fac2f2c

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/trusty-updates 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.0-2ubuntu0.4 to applied/ubuntu/trusty-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:00:13 UTC

Import patches-applied version 3.1.0-2ubuntu0.4 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 37161c7a8954bc89f73d280ae7410a1245328ad6
Unapplied parent: 8a54069bb1949b1c2c61a213121d63530324165e

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/trusty-security 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.0-2ubuntu0.4 to applied/ubuntu/trusty-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:00:13 UTC

Import patches-applied version 3.1.0-2ubuntu0.4 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 37161c7a8954bc89f73d280ae7410a1245328ad6
Unapplied parent: 8a54069bb1949b1c2c61a213121d63530324165e

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/artful-updates 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.2-2ubuntu0.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:34:53 UTC

Import patches-unapplied version 3.1.2-2ubuntu0.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a9e525e4d603906d93c0e26dc21179964e728b63

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/xenial-devel 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.1-3ubuntu1.2 to ubuntu/xenial-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:27:59 UTC

Import patches-unapplied version 3.1.1-3ubuntu1.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 7067af89a5ddf713b9b4857f3936e1e68f74c773

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/artful-devel 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.2-2ubuntu0.2 to applied/ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:34:53 UTC

Import patches-applied version 3.1.2-2ubuntu0.2 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 83adfe9f4b3395e9abb8b0a03b9d88ff8f523c60
Unapplied parent: b25828c63496e2e621d906566c4ba7410d5b2b16

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/xenial-security 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.1-3ubuntu1.2 to applied/ubuntu/xenial-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:27:59 UTC

Import patches-applied version 3.1.1-3ubuntu1.2 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 3e6b338540910599c6e151b153f60e652a99b69a
Unapplied parent: 3b7ec6648d1250384e8afd80e286a39e1fac2f2c

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

applied/ubuntu/trusty-devel 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-applied version 3.1.0-2ubuntu0.4 to applied/ubuntu/trusty-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:00:13 UTC

Import patches-applied version 3.1.0-2ubuntu0.4 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 37161c7a8954bc89f73d280ae7410a1245328ad6
Unapplied parent: 8a54069bb1949b1c2c61a213121d63530324165e

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/trusty-updates 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.0-2ubuntu0.4 to ubuntu/trusty-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:00:13 UTC

Import patches-unapplied version 3.1.0-2ubuntu0.4 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7f4a4f397373ca45d28737868b65757f4dced775

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/trusty-devel 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.0-2ubuntu0.4 to ubuntu/trusty-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:00:13 UTC

Import patches-unapplied version 3.1.0-2ubuntu0.4 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 7f4a4f397373ca45d28737868b65757f4dced775

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/xenial-security 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.1-3ubuntu1.2 to ubuntu/xenial-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:27:59 UTC

Import patches-unapplied version 3.1.1-3ubuntu1.2 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 7067af89a5ddf713b9b4857f3936e1e68f74c773

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/artful-devel 2018-01-23 14:39:58 UTC 2018-01-23
Import patches-unapplied version 3.1.2-2ubuntu0.2 to ubuntu/artful-security

Author: Leonidas S. Barbosa
Author Date: 2018-01-18 20:34:53 UTC

Import patches-unapplied version 3.1.2-2ubuntu0.2 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: a9e525e4d603906d93c0e26dc21179964e728b63

New changelog entries:
  * SECURITY UPDATE: receive_xattr function does not check
    for '\0' character allowing denial of service attacks
    - debian/patches/CVE-2017-16548.patch: enforce trailing
      \0 when receiving xattr values in xattrs.c.
    - CVE-2017-16548
  * SECURITY UPDATE: Allows remote attacker to bypass argument
    - debian/patches/CVE-2018-5764.patch: Ignore --protect-args
      when already sent by client in options.c.
    - CVE-2018-5764

ubuntu/zesty-security 2017-12-07 13:13:10 UTC 2017-12-07
Import patches-unapplied version 3.1.2-1ubuntu0.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-12-06 13:57:38 UTC

Import patches-unapplied version 3.1.2-1ubuntu0.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: f3c9833cf7f7d6ee3f547e66ba0d01a49788f95b

New changelog entries:
  * SECURITY UPDATE: bypass intended access restrictions
    - debian/patches/CVE-2017-17433.patch: check fname in
      recv_files sooner in receiver.c.
    - CVE-2017-17433
  * SECURITY UPDATE: not check for fnamecmp filenames and
    does not apply sanitize_paths
    - debian/patches/CVE-2017-17434-part1.patch: check daemon
      filter against fnamecmp in receiver.c.
    - debian/patches/CVE-2017-17434-part2.patch: sanitize xname
      in rsync.c.
    - CVE-2017-17434

applied/ubuntu/zesty-devel 2017-12-07 13:13:10 UTC 2017-12-07
Import patches-applied version 3.1.2-1ubuntu0.1 to applied/ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-12-06 13:57:38 UTC

Import patches-applied version 3.1.2-1ubuntu0.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 69de4ef1cba505ccef56068d2f1c788f32c0087e
Unapplied parent: 210972788e68f453dfbca6784af5774828691aac

New changelog entries:
  * SECURITY UPDATE: bypass intended access restrictions
    - debian/patches/CVE-2017-17433.patch: check fname in
      recv_files sooner in receiver.c.
    - CVE-2017-17433
  * SECURITY UPDATE: not check for fnamecmp filenames and
    does not apply sanitize_paths
    - debian/patches/CVE-2017-17434-part1.patch: check daemon
      filter against fnamecmp in receiver.c.
    - debian/patches/CVE-2017-17434-part2.patch: sanitize xname
      in rsync.c.
    - CVE-2017-17434

applied/ubuntu/zesty-updates 2017-12-07 13:13:10 UTC 2017-12-07
Import patches-applied version 3.1.2-1ubuntu0.1 to applied/ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-12-06 13:57:38 UTC

Import patches-applied version 3.1.2-1ubuntu0.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 69de4ef1cba505ccef56068d2f1c788f32c0087e
Unapplied parent: 210972788e68f453dfbca6784af5774828691aac

New changelog entries:
  * SECURITY UPDATE: bypass intended access restrictions
    - debian/patches/CVE-2017-17433.patch: check fname in
      recv_files sooner in receiver.c.
    - CVE-2017-17433
  * SECURITY UPDATE: not check for fnamecmp filenames and
    does not apply sanitize_paths
    - debian/patches/CVE-2017-17434-part1.patch: check daemon
      filter against fnamecmp in receiver.c.
    - debian/patches/CVE-2017-17434-part2.patch: sanitize xname
      in rsync.c.
    - CVE-2017-17434

ubuntu/zesty-devel 2017-12-07 13:13:10 UTC 2017-12-07
Import patches-unapplied version 3.1.2-1ubuntu0.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-12-06 13:57:38 UTC

Import patches-unapplied version 3.1.2-1ubuntu0.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: f3c9833cf7f7d6ee3f547e66ba0d01a49788f95b

New changelog entries:
  * SECURITY UPDATE: bypass intended access restrictions
    - debian/patches/CVE-2017-17433.patch: check fname in
      recv_files sooner in receiver.c.
    - CVE-2017-17433
  * SECURITY UPDATE: not check for fnamecmp filenames and
    does not apply sanitize_paths
    - debian/patches/CVE-2017-17434-part1.patch: check daemon
      filter against fnamecmp in receiver.c.
    - debian/patches/CVE-2017-17434-part2.patch: sanitize xname
      in rsync.c.
    - CVE-2017-17434

ubuntu/zesty-updates 2017-12-07 13:13:10 UTC 2017-12-07
Import patches-unapplied version 3.1.2-1ubuntu0.1 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-12-06 13:57:38 UTC

Import patches-unapplied version 3.1.2-1ubuntu0.1 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: f3c9833cf7f7d6ee3f547e66ba0d01a49788f95b

New changelog entries:
  * SECURITY UPDATE: bypass intended access restrictions
    - debian/patches/CVE-2017-17433.patch: check fname in
      recv_files sooner in receiver.c.
    - CVE-2017-17433
  * SECURITY UPDATE: not check for fnamecmp filenames and
    does not apply sanitize_paths
    - debian/patches/CVE-2017-17434-part1.patch: check daemon
      filter against fnamecmp in receiver.c.
    - debian/patches/CVE-2017-17434-part2.patch: sanitize xname
      in rsync.c.
    - CVE-2017-17434

applied/ubuntu/zesty-security 2017-12-07 13:13:10 UTC 2017-12-07
Import patches-applied version 3.1.2-1ubuntu0.1 to applied/ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-12-06 13:57:38 UTC

Import patches-applied version 3.1.2-1ubuntu0.1 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 69de4ef1cba505ccef56068d2f1c788f32c0087e
Unapplied parent: 210972788e68f453dfbca6784af5774828691aac

New changelog entries:
  * SECURITY UPDATE: bypass intended access restrictions
    - debian/patches/CVE-2017-17433.patch: check fname in
      recv_files sooner in receiver.c.
    - CVE-2017-17433
  * SECURITY UPDATE: not check for fnamecmp filenames and
    does not apply sanitize_paths
    - debian/patches/CVE-2017-17434-part1.patch: check daemon
      filter against fnamecmp in receiver.c.
    - debian/patches/CVE-2017-17434-part2.patch: sanitize xname
      in rsync.c.
    - CVE-2017-17434

ubuntu/artful-proposed 2017-03-17 22:21:51 UTC 2017-03-17
Import patches-unapplied version 3.1.2-2 to debian/sid

Author: Paul Slootman
Author Date: 2017-03-17 14:02:00 UTC

Import patches-unapplied version 3.1.2-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f3c9833cf7f7d6ee3f547e66ba0d01a49788f95b

New changelog entries:
  * Added patch from upstream git to resolve temporary lines in --progress
    output not being cleared.
    closes:#749165
  * Added patch from upstream git to speed up handling of xattrs.
    closes:#799143

ubuntu/artful 2017-03-17 22:21:51 UTC 2017-03-17
Import patches-unapplied version 3.1.2-2 to debian/sid

Author: Paul Slootman
Author Date: 2017-03-17 14:02:00 UTC

Import patches-unapplied version 3.1.2-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: f3c9833cf7f7d6ee3f547e66ba0d01a49788f95b

New changelog entries:
  * Added patch from upstream git to resolve temporary lines in --progress
    output not being cleared.
    closes:#749165
  * Added patch from upstream git to speed up handling of xattrs.
    closes:#799143

applied/ubuntu/artful 2017-03-17 22:21:51 UTC 2017-03-17
Import patches-applied version 3.1.2-2 to applied/debian/sid

Author: Paul Slootman
Author Date: 2017-03-17 14:02:00 UTC

Import patches-applied version 3.1.2-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 69de4ef1cba505ccef56068d2f1c788f32c0087e
Unapplied parent: 5efa2a34d79d09492ae0c5f8427e279daea32d01

New changelog entries:
  * Added patch from upstream git to resolve temporary lines in --progress
    output not being cleared.
    closes:#749165
  * Added patch from upstream git to speed up handling of xattrs.
    closes:#799143

applied/ubuntu/artful-proposed 2017-03-17 22:21:51 UTC 2017-03-17
Import patches-applied version 3.1.2-2 to applied/debian/sid

Author: Paul Slootman
Author Date: 2017-03-17 14:02:00 UTC

Import patches-applied version 3.1.2-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 69de4ef1cba505ccef56068d2f1c788f32c0087e
Unapplied parent: 5efa2a34d79d09492ae0c5f8427e279daea32d01

New changelog entries:
  * Added patch from upstream git to resolve temporary lines in --progress
    output not being cleared.
    closes:#749165
  * Added patch from upstream git to speed up handling of xattrs.
    closes:#799143

applied/ubuntu/zesty 2016-10-08 04:23:37 UTC 2016-10-08
Import patches-applied version 3.1.2-1 to applied/debian/sid

Author: Paul Slootman
Author Date: 2016-10-07 13:48:23 UTC

Import patches-applied version 3.1.2-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: f3c9833cf7f7d6ee3f547e66ba0d01a49788f95b

New changelog entries:
  * new upstream release
  * Bumped Standards-Version to 3.9.8 (no change necessary).
  * added deb-systemd-helper stuff to maintainer scripts to properly support
    systemd.
    closes:#764616
  * Modified the /etc/default/rsync and /usr/share/doc/rsync/README.Debian
    to document how to configure the rsync daemon behaviour when using systemd.
    closes:#786549
  * included copy-devices.diff patch from
    https://rsync.samba.org/ftp/rsync/src/rsync-patches-3.1.2.tar.gz to
    enable the --copy-devices option to copy the data inside a device instead
    of copying the node.
    closes:#509335
  * included time-limit.diff patch from
    https://rsync.samba.org/ftp/rsync/src/rsync-patches-3.1.2.tar.gz to
    enable the -stop-at and --time-limit patches to stop rsync at a certain
    time or after a certain duration.
    closes:#701812
  * Add description of value for --compress-level to manpage.
    closes:#700697
  * Don't use hard-coded path to invoke-rc.d for check in prerm script.

applied/ubuntu/zesty-proposed 2016-10-08 04:23:37 UTC 2016-10-08
Import patches-applied version 3.1.2-1 to applied/debian/sid

Author: Paul Slootman
Author Date: 2016-10-07 13:48:23 UTC

Import patches-applied version 3.1.2-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: f3c9833cf7f7d6ee3f547e66ba0d01a49788f95b

New changelog entries:
  * new upstream release
  * Bumped Standards-Version to 3.9.8 (no change necessary).
  * added deb-systemd-helper stuff to maintainer scripts to properly support
    systemd.
    closes:#764616
  * Modified the /etc/default/rsync and /usr/share/doc/rsync/README.Debian
    to document how to configure the rsync daemon behaviour when using systemd.
    closes:#786549
  * included copy-devices.diff patch from
    https://rsync.samba.org/ftp/rsync/src/rsync-patches-3.1.2.tar.gz to
    enable the --copy-devices option to copy the data inside a device instead
    of copying the node.
    closes:#509335
  * included time-limit.diff patch from
    https://rsync.samba.org/ftp/rsync/src/rsync-patches-3.1.2.tar.gz to
    enable the -stop-at and --time-limit patches to stop rsync at a certain
    time or after a certain duration.
    closes:#701812
  * Add description of value for --compress-level to manpage.
    closes:#700697
  * Don't use hard-coded path to invoke-rc.d for check in prerm script.

ubuntu/zesty 2016-10-08 04:23:37 UTC 2016-10-08
Import patches-unapplied version 3.1.2-1 to debian/sid

Author: Paul Slootman
Author Date: 2016-10-07 13:48:23 UTC

Import patches-unapplied version 3.1.2-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * new upstream release
  * Bumped Standards-Version to 3.9.8 (no change necessary).
  * added deb-systemd-helper stuff to maintainer scripts to properly support
    systemd.
    closes:#764616
  * Modified the /etc/default/rsync and /usr/share/doc/rsync/README.Debian
    to document how to configure the rsync daemon behaviour when using systemd.
    closes:#786549
  * included copy-devices.diff patch from
    https://rsync.samba.org/ftp/rsync/src/rsync-patches-3.1.2.tar.gz to
    enable the --copy-devices option to copy the data inside a device instead
    of copying the node.
    closes:#509335
  * included time-limit.diff patch from
    https://rsync.samba.org/ftp/rsync/src/rsync-patches-3.1.2.tar.gz to
    enable the -stop-at and --time-limit patches to stop rsync at a certain
    time or after a certain duration.
    closes:#701812
  * Add description of value for --compress-level to manpage.
    closes:#700697
  * Don't use hard-coded path to invoke-rc.d for check in prerm script.

ubuntu/zesty-proposed 2016-10-08 04:23:37 UTC 2016-10-08
Import patches-unapplied version 3.1.2-1 to debian/sid

Author: Paul Slootman
Author Date: 2016-10-07 13:48:23 UTC

Import patches-unapplied version 3.1.2-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * new upstream release
  * Bumped Standards-Version to 3.9.8 (no change necessary).
  * added deb-systemd-helper stuff to maintainer scripts to properly support
    systemd.
    closes:#764616
  * Modified the /etc/default/rsync and /usr/share/doc/rsync/README.Debian
    to document how to configure the rsync daemon behaviour when using systemd.
    closes:#786549
  * included copy-devices.diff patch from
    https://rsync.samba.org/ftp/rsync/src/rsync-patches-3.1.2.tar.gz to
    enable the --copy-devices option to copy the data inside a device instead
    of copying the node.
    closes:#509335
  * included time-limit.diff patch from
    https://rsync.samba.org/ftp/rsync/src/rsync-patches-3.1.2.tar.gz to
    enable the -stop-at and --time-limit patches to stop rsync at a certain
    time or after a certain duration.
    closes:#701812
  * Add description of value for --compress-level to manpage.
    closes:#700697
  * Don't use hard-coded path to invoke-rc.d for check in prerm script.

ubuntu/wily-devel 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.1.1-3ubuntu0.15.10.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-01-19 20:20:13 UTC

Import patches-unapplied version 3.1.1-3ubuntu0.15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/wily-security 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.1.1-3ubuntu0.15.10.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-01-19 20:20:13 UTC

Import patches-unapplied version 3.1.1-3ubuntu0.15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/precise-devel 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.0.9-1ubuntu1.1 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-01-20 13:00:00 UTC

Import patches-unapplied version 3.0.9-1ubuntu1.1 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 5984cd8724cea145f8dee0eaf49cf23d25d2a0e8

New changelog entries:
  * SECURITY UPDATE: rsync path spoofing attack
    - debian/patches/CVE-2014-9512-0.patch: reject invalid filenames in
      filelist in flist.c, rsync.h, util.c.
    - debian/patches/CVE-2014-9512-1.patch: complain if an inc-recursive
      path is not right for its dir in flist.c, io.c, main.c, rsync.c.
    - debian/patches/CVE-2014-9512-2.patch: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/vivid-devel 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.1.1-3ubuntu0.15.04.1 to ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2016-01-19 20:21:00 UTC

Import patches-unapplied version 3.1.1-3ubuntu0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/wily-updates 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.1.1-3ubuntu0.15.10.1 to ubuntu/wily-security

Author: Marc Deslauriers
Author Date: 2016-01-19 20:20:13 UTC

Import patches-unapplied version 3.1.1-3ubuntu0.15.10.1 to ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/precise-security 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.0.9-1ubuntu1.1 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-01-20 13:00:00 UTC

Import patches-unapplied version 3.0.9-1ubuntu1.1 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 5984cd8724cea145f8dee0eaf49cf23d25d2a0e8

New changelog entries:
  * SECURITY UPDATE: rsync path spoofing attack
    - debian/patches/CVE-2014-9512-0.patch: reject invalid filenames in
      filelist in flist.c, rsync.h, util.c.
    - debian/patches/CVE-2014-9512-1.patch: complain if an inc-recursive
      path is not right for its dir in flist.c, io.c, main.c, rsync.c.
    - debian/patches/CVE-2014-9512-2.patch: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/precise-updates 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.0.9-1ubuntu1.1 to ubuntu/precise-security

Author: Marc Deslauriers
Author Date: 2016-01-20 13:00:00 UTC

Import patches-unapplied version 3.0.9-1ubuntu1.1 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 5984cd8724cea145f8dee0eaf49cf23d25d2a0e8

New changelog entries:
  * SECURITY UPDATE: rsync path spoofing attack
    - debian/patches/CVE-2014-9512-0.patch: reject invalid filenames in
      filelist in flist.c, rsync.h, util.c.
    - debian/patches/CVE-2014-9512-1.patch: complain if an inc-recursive
      path is not right for its dir in flist.c, io.c, main.c, rsync.c.
    - debian/patches/CVE-2014-9512-2.patch: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/wily-updates 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.1.1-3ubuntu0.15.10.1 to applied/ubuntu/wily-...

Author: Marc Deslauriers
Author Date: 2016-01-19 20:20:13 UTC

Import patches-applied version 3.1.1-3ubuntu0.15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 26d46556852535c0da127eea81520b111eafb23e

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/wily-devel 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.1.1-3ubuntu0.15.10.1 to applied/ubuntu/wily-...

Author: Marc Deslauriers
Author Date: 2016-01-19 20:20:13 UTC

Import patches-applied version 3.1.1-3ubuntu0.15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 26d46556852535c0da127eea81520b111eafb23e

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/wily-security 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.1.1-3ubuntu0.15.10.1 to applied/ubuntu/wily-...

Author: Marc Deslauriers
Author Date: 2016-01-19 20:20:13 UTC

Import patches-applied version 3.1.1-3ubuntu0.15.10.1 to applied/ubuntu/wily-security

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 26d46556852535c0da127eea81520b111eafb23e

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/vivid-updates 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.1.1-3ubuntu0.15.04.1 to applied/ubuntu/vivid...

Author: Marc Deslauriers
Author Date: 2016-01-19 20:21:00 UTC

Import patches-applied version 3.1.1-3ubuntu0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 95741923ba87d547242a56192b670321b354697e

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/vivid-security 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.1.1-3ubuntu0.15.04.1 to applied/ubuntu/vivid...

Author: Marc Deslauriers
Author Date: 2016-01-19 20:21:00 UTC

Import patches-applied version 3.1.1-3ubuntu0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 95741923ba87d547242a56192b670321b354697e

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/vivid-devel 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.1.1-3ubuntu0.15.04.1 to applied/ubuntu/vivid...

Author: Marc Deslauriers
Author Date: 2016-01-19 20:21:00 UTC

Import patches-applied version 3.1.1-3ubuntu0.15.04.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 95741923ba87d547242a56192b670321b354697e

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/vivid-security 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.1.1-3ubuntu0.15.04.1 to ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2016-01-19 20:21:00 UTC

Import patches-unapplied version 3.1.1-3ubuntu0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/vivid-updates 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-unapplied version 3.1.1-3ubuntu0.15.04.1 to ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2016-01-19 20:21:00 UTC

Import patches-unapplied version 3.1.1-3ubuntu0.15.04.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/precise-updates 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.0.9-1ubuntu1.1 to applied/ubuntu/precise-sec...

Author: Marc Deslauriers
Author Date: 2016-01-20 13:00:00 UTC

Import patches-applied version 3.0.9-1ubuntu1.1 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 7df74bedbd69797b2560fe0802ea8c4f399e7909
Unapplied parent: 3613244fb756814d6eeaf103cb22f59c5b6fea64

New changelog entries:
  * SECURITY UPDATE: rsync path spoofing attack
    - debian/patches/CVE-2014-9512-0.patch: reject invalid filenames in
      filelist in flist.c, rsync.h, util.c.
    - debian/patches/CVE-2014-9512-1.patch: complain if an inc-recursive
      path is not right for its dir in flist.c, io.c, main.c, rsync.c.
    - debian/patches/CVE-2014-9512-2.patch: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/precise-security 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.0.9-1ubuntu1.1 to applied/ubuntu/precise-sec...

Author: Marc Deslauriers
Author Date: 2016-01-20 13:00:00 UTC

Import patches-applied version 3.0.9-1ubuntu1.1 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 7df74bedbd69797b2560fe0802ea8c4f399e7909
Unapplied parent: 3613244fb756814d6eeaf103cb22f59c5b6fea64

New changelog entries:
  * SECURITY UPDATE: rsync path spoofing attack
    - debian/patches/CVE-2014-9512-0.patch: reject invalid filenames in
      filelist in flist.c, rsync.h, util.c.
    - debian/patches/CVE-2014-9512-1.patch: complain if an inc-recursive
      path is not right for its dir in flist.c, io.c, main.c, rsync.c.
    - debian/patches/CVE-2014-9512-2.patch: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/precise-devel 2016-01-21 18:29:31 UTC 2016-01-21
Import patches-applied version 3.0.9-1ubuntu1.1 to applied/ubuntu/precise-sec...

Author: Marc Deslauriers
Author Date: 2016-01-20 13:00:00 UTC

Import patches-applied version 3.0.9-1ubuntu1.1 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 7df74bedbd69797b2560fe0802ea8c4f399e7909
Unapplied parent: 3613244fb756814d6eeaf103cb22f59c5b6fea64

New changelog entries:
  * SECURITY UPDATE: rsync path spoofing attack
    - debian/patches/CVE-2014-9512-0.patch: reject invalid filenames in
      filelist in flist.c, rsync.h, util.c.
    - debian/patches/CVE-2014-9512-1.patch: complain if an inc-recursive
      path is not right for its dir in flist.c, io.c, main.c, rsync.c.
    - debian/patches/CVE-2014-9512-2.patch: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/yakkety 2016-01-19 20:58:42 UTC 2016-01-19
Import patches-unapplied version 3.1.1-3ubuntu1 to ubuntu/xenial-proposed

Author: Marc Deslauriers
Author Date: 2016-01-19 19:58:35 UTC

Import patches-unapplied version 3.1.1-3ubuntu1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/yakkety-devel 2016-01-19 20:58:42 UTC 2016-01-19
Import patches-unapplied version 3.1.1-3ubuntu1 to ubuntu/xenial-proposed

Author: Marc Deslauriers
Author Date: 2016-01-19 19:58:35 UTC

Import patches-unapplied version 3.1.1-3ubuntu1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/xenial 2016-01-19 20:58:42 UTC 2016-01-19
Import patches-unapplied version 3.1.1-3ubuntu1 to ubuntu/xenial-proposed

Author: Marc Deslauriers
Author Date: 2016-01-19 19:58:35 UTC

Import patches-unapplied version 3.1.1-3ubuntu1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/xenial-proposed 2016-01-19 20:58:42 UTC 2016-01-19
Import patches-applied version 3.1.1-3ubuntu1 to applied/ubuntu/xenial-proposed

Author: Marc Deslauriers
Author Date: 2016-01-19 19:58:35 UTC

Import patches-applied version 3.1.1-3ubuntu1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 5bfd701280571db36b7a211350b009e1be0c64a4

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/xenial 2016-01-19 20:58:42 UTC 2016-01-19
Import patches-applied version 3.1.1-3ubuntu1 to applied/ubuntu/xenial-proposed

Author: Marc Deslauriers
Author Date: 2016-01-19 19:58:35 UTC

Import patches-applied version 3.1.1-3ubuntu1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 5bfd701280571db36b7a211350b009e1be0c64a4

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/yakkety-devel 2016-01-19 20:58:42 UTC 2016-01-19
Import patches-applied version 3.1.1-3ubuntu1 to applied/ubuntu/xenial-proposed

Author: Marc Deslauriers
Author Date: 2016-01-19 19:58:35 UTC

Import patches-applied version 3.1.1-3ubuntu1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 5bfd701280571db36b7a211350b009e1be0c64a4

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

applied/ubuntu/yakkety 2016-01-19 20:58:42 UTC 2016-01-19
Import patches-applied version 3.1.1-3ubuntu1 to applied/ubuntu/xenial-proposed

Author: Marc Deslauriers
Author Date: 2016-01-19 19:58:35 UTC

Import patches-applied version 3.1.1-3ubuntu1 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 7a8766ffe339add0c4a670d62a38c22db17ee49d
Unapplied parent: 5bfd701280571db36b7a211350b009e1be0c64a4

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/xenial-proposed 2016-01-19 20:58:42 UTC 2016-01-19
Import patches-unapplied version 3.1.1-3ubuntu1 to ubuntu/xenial-proposed

Author: Marc Deslauriers
Author Date: 2016-01-19 19:58:35 UTC

Import patches-unapplied version 3.1.1-3ubuntu1 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * SECURITY UPDATE: incomplete fix for rsync path spoofing attack
    - debian/patches/CVE-2014-9512-2.diff: add parent-dir validation for
      --no-inc-recurse too in flist.c, generator.c.
    - CVE-2014-9512

ubuntu/vivid-proposed 2015-03-07 22:17:11 UTC 2015-03-07
Import patches-unapplied version 3.1.1-3 to debian/sid

Author: Paul Slootman
Author Date: 2015-03-07 14:45:05 UTC

Import patches-unapplied version 3.1.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 078dc6758a9d5984c03d5ba04473ea993632d050

New changelog entries:
  * Added patch for CVE-2014-9512, Rsync path spoofing attack vulnerability.
    closes:#778333

ubuntu/wily 2015-03-07 22:17:11 UTC 2015-03-07
Import patches-unapplied version 3.1.1-3 to debian/sid

Author: Paul Slootman
Author Date: 2015-03-07 14:45:05 UTC

Import patches-unapplied version 3.1.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 078dc6758a9d5984c03d5ba04473ea993632d050

New changelog entries:
  * Added patch for CVE-2014-9512, Rsync path spoofing attack vulnerability.
    closes:#778333

applied/ubuntu/wily 2015-03-07 22:17:11 UTC 2015-03-07
Import patches-applied version 3.1.1-3 to applied/debian/sid

Author: Paul Slootman
Author Date: 2015-03-07 14:45:05 UTC

Import patches-applied version 3.1.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 6d9db7d5d85ea21a8085ab34607dced6883cb4e5
Unapplied parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * Added patch for CVE-2014-9512, Rsync path spoofing attack vulnerability.
    closes:#778333

applied/ubuntu/vivid-proposed 2015-03-07 22:17:11 UTC 2015-03-07
Import patches-applied version 3.1.1-3 to applied/debian/sid

Author: Paul Slootman
Author Date: 2015-03-07 14:45:05 UTC

Import patches-applied version 3.1.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 6d9db7d5d85ea21a8085ab34607dced6883cb4e5
Unapplied parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * Added patch for CVE-2014-9512, Rsync path spoofing attack vulnerability.
    closes:#778333

applied/ubuntu/vivid 2015-03-07 22:17:11 UTC 2015-03-07
Import patches-applied version 3.1.1-3 to applied/debian/sid

Author: Paul Slootman
Author Date: 2015-03-07 14:45:05 UTC

Import patches-applied version 3.1.1-3 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 6d9db7d5d85ea21a8085ab34607dced6883cb4e5
Unapplied parent: 63041cec32b0861cd347c799051489fb6d882fdb

New changelog entries:
  * Added patch for CVE-2014-9512, Rsync path spoofing attack vulnerability.
    closes:#778333

ubuntu/vivid 2015-03-07 22:17:11 UTC 2015-03-07
Import patches-unapplied version 3.1.1-3 to debian/sid

Author: Paul Slootman
Author Date: 2015-03-07 14:45:05 UTC

Import patches-unapplied version 3.1.1-3 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 078dc6758a9d5984c03d5ba04473ea993632d050

New changelog entries:
  * Added patch for CVE-2014-9512, Rsync path spoofing attack vulnerability.
    closes:#778333

ubuntu/utopic-devel 2014-08-09 16:23:48 UTC 2014-08-09
Import patches-unapplied version 3.1.1-2 to debian/sid

Author: Paul Slootman
Author Date: 2014-08-09 09:02:31 UTC

Import patches-unapplied version 3.1.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d79fe3e50cd8fe8260a666d74ac80140639f3a36

New changelog entries:
  * hardening flags were not applied correctly, debian/rules modified thanks
    to patch from Simon Ruderich.
    closes:#754412

applied/ubuntu/utopic-proposed 2014-08-09 16:23:48 UTC 2014-08-09
Import patches-applied version 3.1.1-2 to applied/debian/sid

Author: Paul Slootman
Author Date: 2014-08-09 09:02:31 UTC

Import patches-applied version 3.1.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4d256555cb34a00ba0cd72afeca36fcc275e7ac6
Unapplied parent: 078dc6758a9d5984c03d5ba04473ea993632d050

New changelog entries:
  * hardening flags were not applied correctly, debian/rules modified thanks
    to patch from Simon Ruderich.
    closes:#754412

applied/ubuntu/utopic-devel 2014-08-09 16:23:48 UTC 2014-08-09
Import patches-applied version 3.1.1-2 to applied/debian/sid

Author: Paul Slootman
Author Date: 2014-08-09 09:02:31 UTC

Import patches-applied version 3.1.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4d256555cb34a00ba0cd72afeca36fcc275e7ac6
Unapplied parent: 078dc6758a9d5984c03d5ba04473ea993632d050

New changelog entries:
  * hardening flags were not applied correctly, debian/rules modified thanks
    to patch from Simon Ruderich.
    closes:#754412

applied/ubuntu/utopic 2014-08-09 16:23:48 UTC 2014-08-09
Import patches-applied version 3.1.1-2 to applied/debian/sid

Author: Paul Slootman
Author Date: 2014-08-09 09:02:31 UTC

Import patches-applied version 3.1.1-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 4d256555cb34a00ba0cd72afeca36fcc275e7ac6
Unapplied parent: 078dc6758a9d5984c03d5ba04473ea993632d050

New changelog entries:
  * hardening flags were not applied correctly, debian/rules modified thanks
    to patch from Simon Ruderich.
    closes:#754412

ubuntu/utopic-proposed 2014-08-09 16:23:48 UTC 2014-08-09
Import patches-unapplied version 3.1.1-2 to debian/sid

Author: Paul Slootman
Author Date: 2014-08-09 09:02:31 UTC

Import patches-unapplied version 3.1.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d79fe3e50cd8fe8260a666d74ac80140639f3a36

New changelog entries:
  * hardening flags were not applied correctly, debian/rules modified thanks
    to patch from Simon Ruderich.
    closes:#754412

ubuntu/utopic 2014-08-09 16:23:48 UTC 2014-08-09
Import patches-unapplied version 3.1.1-2 to debian/sid

Author: Paul Slootman
Author Date: 2014-08-09 09:02:31 UTC

Import patches-unapplied version 3.1.1-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d79fe3e50cd8fe8260a666d74ac80140639f3a36

New changelog entries:
  * hardening flags were not applied correctly, debian/rules modified thanks
    to patch from Simon Ruderich.
    closes:#754412

1100 of 220 results

Other repositories

Name Last Modified
lp:ubuntu/+source/rsync 2018-10-30
11 of 1 result
You can't create new repositories for rsync in Ubuntu.