-
libzstd (1.4.4+dfsg-3ubuntu0.1) focal-security; urgency=medium
* SECURITY UPDATE: race condition allows attacker to access
world-readable destination file
- debian/patches/0018-fix-file-permissions-on-compression.patch: set
umask in programs/fileio.c, programs/util.c, programs/util.h.
- CVE-2021-24031
- CVE-2021-24032
-- Marc Deslauriers <email address hidden> Wed, 03 Mar 2021 10:47:34 -0500
-
libzstd (1.4.4+dfsg-3) unstable; urgency=medium
* Team upload.
* Source only upload.
-- Michael R. Crusoe <email address hidden> Thu, 13 Feb 2020 10:40:13 +0100
-
libzstd (1.4.4+dfsg-1) unstable; urgency=medium
[ Justin Aplin ]
* New upstream version 1.4.4+dfsg
* Refresh patches
* Call Salsa CI with variable DB_BUILD_PARAM: '-v1.1.2-1', since this is the
oldest version in active repositories
* Add Rules-Requires-Root: binary-targets to debian/control to comply with
current DPM
* Bump Standards-Version to 4.4.1, changes noted above
* Update symbols file for libzstd1
* Call dh_makeshlibs with -V 'libzstd1 (>= 1.4.4)', since this version
introduced new public symbols
* Add an entry in debian/source/lintian-overrides to prevent libzstd1's
Section entry from triggering binary-control-field-duplicates-source,
since this field is necessary for the build
-- Alexandre Mestiashvili <email address hidden> Fri, 15 Nov 2019 17:15:40 +0100
-
libzstd (1.4.3+dfsg-1) unstable; urgency=medium
[ Alexandre Mestiashvili ]
* Fix a typo causing test failures on mips(el) architectures in
d/patches/0013-skip-memory-greedy-tests.patch
* Remove circle.yml from Files-Excluded section in d/copyright
* New upstream version 1.4.3+dfsg
-- Alexandre Mestiashvili <email address hidden> Tue, 20 Aug 2019 13:33:51 +0200