Filename | Latest Rev | Last Changed | Committer | Comment | Size | ||
---|---|---|---|---|---|---|---|
.. | |||||||
01_use_pkg-config_for_pcsc-lite_module.patch | 2 | 12 years ago | Package Import Robot | [ Stefan Lippers-Hollmann ] * import new upstream | |||
02_dbus_group_policy.patch | 2 | 12 years ago | Package Import Robot | [ Stefan Lippers-Hollmann ] * import new upstream | |||
06_wpa_gui_menu_exec_path.patch | 2 | 12 years ago | Package Import Robot | [ Stefan Lippers-Hollmann ] * import new upstream | |||
07_dbus_service_syslog.patch | 2 | 12 years ago | Package Import Robot | [ Stefan Lippers-Hollmann ] * import new upstream | |||
12_wpa_gui_knotify_support.patch | 2 | 12 years ago | Package Import Robot | [ Stefan Lippers-Hollmann ] * import new upstream | |||
CVE-2014-3686.patch | 15 | 9 years ago | Package Import Robot | * SECURITY UPDATE: arbitrary command execution via | |||
dbus-activation-cmdline.patch | 3 | 12 years ago | Package Import Robot | * debian/wpasupplicant.postinst, debian/hostapd.po | |||
EAP-TLS-server_fix-TLS-Message-length-validation.patch | 2.1.3 | 11 years ago | Package Import Robot | * ship forgotten README-P2P. * revert to GNU readl | |||
git_accept_client_cert_from_server.patch | 12 | 10 years ago | Package Import Robot | * New upstream release (LP: #1099755) * debian/get | |||
git_update_scan_res_for_apscan_1_068e3877.patch | 14 | 9 years ago | Package Import Robot | debian/patches/git_update_scan_res_for_apscan_1_06 | |||
session-ticket.patch | 7 | 11 years ago | Package Import Robot | debian/patches/session-ticket.patch: disable the T | |||
.quilt_patches | 8 | 11 years ago | Package Import Robot | * Merge from Debian unstable. Remaining changes: | 15 bytes | ||
.quilt_series | 8 | 11 years ago | Package Import Robot | * Merge from Debian unstable. Remaining changes: | 7 bytes | ||
.version | 2 | 12 years ago | Package Import Robot | [ Stefan Lippers-Hollmann ] * import new upstream | 2 bytes | ||
applied-patches | 15 | 9 years ago | Package Import Robot | * SECURITY UPDATE: arbitrary command execution via | 381 bytes |