utils-std 0.0.12 - 2025-10-23 This is a security issue, mv(1) had an unsafe strcpy of the path which can lead to a buffer overflow of the stack (typically non-executable). Haelwenn (lanodan) Monnier (7): cmd/df: cast blksize_t to (long int) for printf configure.d/{o_path,posix_fadvise}.c: add missing copyright header test-cmd/time.t: switch to tap.sh test-cmd/time.sh: test output with "sleep 1" libutils: add lib_strlcpy Replace strncpy with lib_strlcpy reuse convert-dep5