File: series

package info (click to toggle)
util-linux 2.36.1-8%2Bdeb11u2
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 50,684 kB
  • sloc: ansic: 135,480; sh: 16,120; yacc: 1,171; makefile: 407; xml: 389; python: 316; csh: 37; sed: 16; perl: 15
file content (17 lines) | stat: -rw-r--r-- 997 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
upstream/upstream_build-sys-do-not-build-plymouth-ctrl.c-w-disabled-pl.patch
upstream/upstream_hwclock-do-not-assume-__NR_settimeofday_time32.patch
upstream/0001-libmount-don-t-use-symfollow-for-helpers-on-user-mou.patch
upstream/Manual-pages-document-the-resize-command.patch
debian/man-getopt-examples.patch
debian/verbose-tests.patch
upstream/libmount-do-not-canonicalize-ZFS-source-dataset.patch
upstream/libmount-allow-read-only-for-not-root-users.patch
upstream/CVE-2021-37600-sys-utils-ipcutils-be-careful-when-call-calloc.patch
debian/backport-ul_strtou64-function.patch
upstream/libmount-fix-UID-check-for-FUSE-umount-CVE-2021-3995.patch
upstream/libmount-fix-deleted-suffix-issue-CVE-2021-3996.patch
upstream/write-correctly-handle-wide-characters.patch
upstream/wall-convert-homebrew-buffering-to-open_memstream.patch
upstream/wall-use-fputs_careful.patch
upstream/wall-fix-calloc-cal-Werror-calloc-transposed-args.patch
upstream/wall-fix-escape-sequence-Injection-CVE-2024-28085.patch