Package patch-2.7.6-11.el8.x86_64
Name | patch |
---|---|
Epoch | 0 |
Version | 2.7.6 |
Release | 11.el8 |
Architecture | x86_64 |
Website/URL | http://www.gnu.org/software/patch/patch.html |
License | GPLv3+ |
Build Time | 2023-08-08 16:25:05 |
Build Host | builder-x86-01.inferitos.ru |
Summary | Utility for modifying/upgrading files |
Repositories | BaseOS |
Description | The patch program applies diff files to originals. The diff command is used to compare an original to a changed file. Diff lists the changes made to the file. A person who has the original file can then use the patch command with the diff file to add the changes to their original file (patching the file). Patch should be installed because it is a common way of upgrading applications. |
Errata | — |
Size | 137 KiB |
Source Project | patch-2.7.6-11.el8 |
SHA-256 checksum | 5b27a901dfcdb2a18948e1ad19c14a29cc738d8ff5854f4c27bae33e224f02c9 |
×
* Wed Jul 26 2023 MSVSphere Packaging Team <packager@msvsphere.ru> - 2.7.6-11 - Rebuilt for MSVSphere 8.8 * Tue Nov 19 2019 Than Ngo <than@redhat.com> - 2.7.6-11 - Related: #1733565, apply the patch correctly * Tue Nov 19 2019 Than Ngo <than@redhat.com> - 2.7.6-10 - CVE-2019-13636 , Don't follow symlinks unless --follow-symlinks is given - Resolves: #1665928, patch has a huge error output and segfaults when the file to be patched does not exist * Mon Sep 02 2019 Than Ngo <than@redhat.com> - 2.7.6-9 - CVE-2018-20969, invoke ed directly instead of using the shell * Tue Nov 27 2018 Than Ngo <than@redhat.com> - 2.7.6-8 - Added virtual provides for bundled gnulib library * Wed Sep 12 2018 Than Ngo <than@redhat.com> - 2.7.6-7 - Resolves: #1554752, CVE-2018-6952 Double free of memory * Mon Jun 18 2018 Than Ngo <than@redhat.com> - 2.7.6-6 - avoid warnings from GCC8 * Mon Apr 09 2018 Than Ngo <than@redhat.com> - 2.7.6-5 - fixed CVE-2018-1000156 * Tue Mar 13 2018 Than Ngo <than@redhat.com> - 2.7.6-4 - apply the patch for CVE-2018-6951 * Mon Feb 12 2018 Tim Waugh <twaugh@redhat.com> - 2.7.6-3 - 2.7.6 (CVE-2016-10713, CVE-2018-6951, CVE-2018-6952).