Package: util-linux / 2.25.2-6
Metadata
Package | Version | Patches format |
---|---|---|
util-linux | 2.25.2-6 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
Multiarch support in util linux build.patch | (download) |
Makefile.am |
1 1 + 0 - 0 ! |
multiarch support in util-linux build Addresses-Debian-Bug: 631175 Signed-off-by: LaMont Jones <lamont@debian.org> Conflicts: debian/control debian/libblkid-dev.files debian/libblkid1.files debian/libmount-dev.files debian/libmount1.files debian/libuuid1.files debian/rules debian/uuid-dev.files |
cfdisk.8 mention slang next to curses. Closes 295487.patch | (download) |
disk-utils/cfdisk.8 |
2 1 + 1 - 0 ! |
cfdisk.8: mention slang next to curses. closes: #295487 Conflicts: fdisk/cfdisk.8 |
man page tweaks cleanup my_dev_t.h ancient stuff.patch | (download) |
sys-utils/hwclock.8 |
4 2 + 2 - 0 ! |
man page tweaks, cleanup my_dev_t.h ancient stuff Conflicts: getopt/getopt.1 mount/my_dev_t.h |
Disable the fallback clause in hwclock when dev rtc .patch | (download) |
sys-utils/hwclock.c |
10 10 + 0 - 0 ! |
disable the fallback clause in hwclock when /dev/rtc cannot be opened. hwclock should not access the x86 RTC using I/O instructions unless explicitly requested from the command line (--directisa). This issue was encountered while debugging a boot time race when hwclock.sh was run in parallel. Addresses-Ubuntu-Bug: 274402 Signed-off-by: Tim Gardner <tim.gardner@canonical.com> Signed-off-by: LaMont Jones <lamont@debian.org> Conflicts: hwclock/hwclock.c |
verbose tests.patch | (download) |
tests/Makemodule.am |
2 1 + 1 - 0 ! |
verbose-tests Enable verbose tests and print content of failing tests output file. |
Update POT file.patch | (download) |
po/util-linux.pot |
82 46 + 36 - 0 ! |
update pot file |
Update PO files.patch | (download) |
po/ca.po |
82 46 + 36 - 0 ! |
update po files |
Update German translation.patch | (download) |
po/de.po |
90 67 + 23 - 0 ! |
update german translation |
Update Spanish translation.patch | (download) |
po/es.po |
1500 900 + 600 - 0 ! |
update spanish translation |
Update French translation.patch | (download) |
po/fr.po |
12 7 + 5 - 0 ! |
update french translation |
Update Ukrainian translation.patch | (download) |
po/uk.po |
9 4 + 5 - 0 ! |
update ukrainian translation |
Update Brazilian Portuguese translation.patch | (download) |
po/pt_BR.po |
7 3 + 4 - 0 ! |
update brazilian portuguese translation |
Update Chinese simplified translation.patch | (download) |
po/zh_CN.po |
1187 499 + 688 - 0 ! |
update chinese (simplified) translation |
Update Danish translation.patch | (download) |
po/da.po |
1536 742 + 794 - 0 ! |
update danish translation |
Update Finnish translation.patch | (download) |
po/fi.po |
173 71 + 102 - 0 ! |
update finnish translation |
Update Japanese translation.patch | (download) |
po/ja.po |
459 418 + 41 - 0 ! |
update japanese translation |
Update Russian translation.patch | (download) |
po/ru.po |
11377 5367 + 6010 - 0 ! |
update russian translation |
Trivial unfuzzy.patch | (download) |
po/cs.po |
3 1 + 2 - 0 ! |
trivial unfuzzy |
libblkid care about unsafe chars in cache.patch | (download) |
libblkid/src/read.c |
21 18 + 3 - 0 ! |
libblkid: care about unsafe chars in cache The high-level libblkid API uses /run/blkid/blkid.tab cache to store probing results. The cache format is <device NAME="value" ...>devname</device> and unfortunately the cache code does not escape quotation marks: # mkfs.ext4 -L 'AAA"BBB' # cat /run/blkid/blkid.tab ... <device ... LABEL="AAA"BBB" ...>/dev/sdb1</device> such string is later incorrectly parsed and blkid(8) returns nonsenses. And for use-cases like # eval $(blkid -o export /dev/sdb1) it's also insecure. Note that mount, udevd and blkid -p are based on low-level libblkid API, it bypass the cache and directly read data from the devices. The current udevd upstream does not depend on blkid(8) output at all, it's directly linked with the library and all unsafe chars are encoded by \x<hex> notation. # mkfs.ext4 -L 'X"`/tmp/foo` "' /dev/sdb1 # udevadm info --export-db | grep LABEL ... E: ID_FS_LABEL=X__/tmp/foo___ E: ID_FS_LABEL_ENC=X\x22\x60\x2ftmp\x2ffoo\x60\x20\x22 Signed-off-by: Karel Zak <kzak@redhat.com> |
unshare Fix map root user to work on new kernels.patch | (download) |
include/pathnames.h |
1 1 + 0 - 0 ! |
unshare: fix --map-root-user to work on new kernels In rare cases droping groups with setgroups(0, NULL) is an operation that can grant a user additional privileges. User namespaces were allwoing that operation to unprivileged users and that had to be fixed. Update unshare --map-root-user to disable the setgroups operation before setting the gid_map. This is needed as after the security fix gid_map is restricted to privileged users unless setgroups has been disabled. Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> |