Branches for Hardy

Name Status Last Modified Last Commit
lp:ubuntu/hardy/devscripts 2 Mature 2009-12-19 07:31:55 UTC
51. * Backport from 2.10.25 - debsign: ...

Author: Scott Kitterman
Revision Date: 2008-04-16 09:47:57 UTC

* Backport from 2.10.25
  - debsign: Update to 2.10.25 version for correct Checksums-* updating
    needed for compatibility with dak in Debian - update man page too
  - debsign: Include previous Ubuntu difference to provide
    $DEBSIGN_ALWAYS_RESIGN support

lp:ubuntu/hardy-security/devscripts 2 Mature 2012-02-15 03:33:36 UTC
53. * SECURITY UPDATE: Arbitrary code exe...

Author: Tyler Hicks
Revision Date: 2012-02-15 03:33:36 UTC

* SECURITY UPDATE: Arbitrary code execution via crafted filenames in .dsc
  and .changes files
  - scripts/debdiff.pl: Perform input sanitization on filenames. Thanks to
    Raphael Geissert for the original patch.
  - CVE-2012-0210
* SECURITY UPDATE: Arbitrary code execution via crafted filenames in the top
  level directory of the original upstream source tarball
  - scripts/debdiff.pl: Perform input sanitization on filenames. Thanks to
    Adam D. Barratt for the original patch.
  - CVE-2012-0211
* SECURITY UPDATE: Arbritray code execution via crafted filenames in
  arguments passed to debdiff
  - scripts/debdiff.pl: Perform input sanitization on filenames. Based on
    upstream patches.
  - http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=87f88232eb643f0c118c6ba38db8e966915b450f
  - http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=76227af1ee8d68f4844f642325eac903ca21e739
  - CVE-2012-0212
* scripts/debdiff.pl: Remove undocumented functionality which treated
  files with extentionless filenames as packages. Thanks to Adam D. Barratt
  for the original patch.
  - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659559

lp:ubuntu/hardy-backports/devscripts 1 Development 2009-07-03 07:37:27 UTC
55. Automated backport upload; no source ...

Author: Martin Pitt
Revision Date: 2008-11-11 15:40:01 UTC

Automated backport upload; no source changes.

lp:ubuntu/hardy-proposed/devscripts bug 1 Development 2009-07-30 21:03:12 UTC
54. [ Marian Sigler ] Update rmadison's U...

Author: Onkar Shinde
Revision Date: 2009-07-16 13:59:23 UTC

[ Marian Sigler ]
Update rmadison's Ubuntu URL to cope with people.ubuntu.com ->
people.canonical.com; invoke curl in such a way as to follow redirects
by default (LP: #399891).

lp:ubuntu/hardy-updates/devscripts 1 Development 2012-02-15 03:33:36 UTC
53. * SECURITY UPDATE: Arbitrary code exe...

Author: Tyler Hicks
Revision Date: 2012-02-15 03:33:36 UTC

* SECURITY UPDATE: Arbitrary code execution via crafted filenames in .dsc
  and .changes files
  - scripts/debdiff.pl: Perform input sanitization on filenames. Thanks to
    Raphael Geissert for the original patch.
  - CVE-2012-0210
* SECURITY UPDATE: Arbitrary code execution via crafted filenames in the top
  level directory of the original upstream source tarball
  - scripts/debdiff.pl: Perform input sanitization on filenames. Thanks to
    Adam D. Barratt for the original patch.
  - CVE-2012-0211
* SECURITY UPDATE: Arbritray code execution via crafted filenames in
  arguments passed to debdiff
  - scripts/debdiff.pl: Perform input sanitization on filenames. Based on
    upstream patches.
  - http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=87f88232eb643f0c118c6ba38db8e966915b450f
  - http://anonscm.debian.org/gitweb/?p=devscripts/devscripts.git;a=commitdiff;h=76227af1ee8d68f4844f642325eac903ca21e739
  - CVE-2012-0212
* scripts/debdiff.pl: Remove undocumented functionality which treated
  files with extentionless filenames as packages. Thanks to Adam D. Barratt
  for the original patch.
  - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659559

15 of 5 results