News for package arj

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 3.0 (quilt)
Source: arj
Binary: arj
Architecture: any
Version: 3.10.22-13
Maintainer: Guillem Jover <[email protected]>
Uploaders: Ola Lundqvist <[email protected]>
Homepage: http://sf.net/projects/arj/
Standards-Version: 3.9.5
Vcs-Browser: http://git.hadrons.org/?p=debian/pkgs/arj.git
Vcs-Git: git://git.hadrons.org/git/debian/pkgs/arj.git
Build-Depends: debhelper (>= 9), autotools-dev, autoconf
Package-List:
 arj deb utils optional arch=any
Checksums-Sha1:
 e8470f480e9eee14906e5485a8898e5c24738c8b 431467 arj_3.10.22.orig.tar.gz
 43dbf02ffbcd78a1d408215f63dbf7209eba9634 15904 arj_3.10.22-13.debian.tar.xz
Checksums-Sha256:
 589e4c9bccc8669e7b6d8d6fcd64e01f6a2c21fe10aad56a83304ecc3b96a7db 431467 arj_3.10.22.orig.tar.gz
 d74588f13a2de780d762d3405b0216a02cf4e55bda4ac4703cab94310ac3ea46 15904 arj_3.10.22-13.debian.tar.xz
Files:
 f263bf3cf6d42a8b7e85b4fb514336d3 431467 arj_3.10.22.orig.tar.gz
 2623eac2713d5d0d116261c1cf707dc8 15904 arj_3.10.22-13.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=u0ql
-----END PGP SIGNATURE-----

Changes:
arj (3.10.22-13) unstable; urgency=high

  * Fix buffer overflow from size under user control, causing free() on an
    invalid pointer. (Closes: #774015)
  * Fix absolute path directory traversal. Fixes CVE-2015-0557.
    (Closes: #774435)
  * Fix symlink directory traversal. Fixes CVE-2015-0556. (Closes: #774434)

 -- Guillem Jover <[email protected]>  Sat, 28 Mar 2015 04:22:18 +0100