patch_2.7.5-1ubuntu0.16.04.2_i386.deb


Advertisement

Description

patch - Apply a diff file to an original

Property Value
Distribution Ubuntu 16.04 LTS (Xenial Xerus)
Repository Ubuntu Updates Main i386
Package filename patch_2.7.5-1ubuntu0.16.04.2_i386.deb
Package name patch
Package version 2.7.5
Package release 1ubuntu0.16.04.2
Package architecture i386
Package type deb
Category utils
Homepage http://savannah.gnu.org/projects/patch/
License -
Maintainer Ubuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
Download size 97.34 KB
Installed size 230.00 KB
Patch will take a patch file containing any of the four forms
of difference listing produced by the diff program and apply
those differences to an original file, producing a patched
version.

Alternatives

Package Version Architecture Repository
patch_2.7.5-1ubuntu0.16.04.2_amd64.deb 2.7.5 amd64 Ubuntu Updates Main
patch_2.7.5-1_i386.deb 2.7.5 i386 Ubuntu Main
patch_2.7.5-1_amd64.deb 2.7.5 amd64 Ubuntu Main
patch - - -

Requires

Name Value
libc6 >= 2.17

Download

Type URL
Mirror archive.ubuntu.com
Binary Package patch_2.7.5-1ubuntu0.16.04.2_i386.deb
Source Package patch

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install patch deb package:
    # sudo apt-get install patch

Files

Path
/usr/bin/patch
/usr/share/doc/patch/AUTHORS
/usr/share/doc/patch/NEWS.Debian.gz
/usr/share/doc/patch/NEWS.gz
/usr/share/doc/patch/README
/usr/share/doc/patch/changelog.Debian.gz
/usr/share/doc/patch/copyright
/usr/share/lintian/overrides/patch
/usr/share/man/man1/patch.1.gz

Changelog

2019-07-23 - Leonidas S. Barbosa <leo.barbosa@canonical.com>
patch (2.7.5-1ubuntu0.16.04.2) xenial-security; urgency=medium
* SECURITY UPDATE: Directory traversal
- debian/patches/CVE-2019-13636.patch: Don't follow symlinks unless
--follow-symlinks is given in src/inp.c, src/util.c.
- CVE-2019-13636
* SECURITY UPDATE: Shell command injection
- debian/patches/CVE-2019-13638.patch: Invoke ed directly instead of
using the shell in src/pch.c.
- CVE-2019-13638
2018-04-09 - Leonidas S. Barbosa <leo.barbosa@canonical.com>
patch (2.7.5-1ubuntu0.16.04.1) xenial-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds access
- debian/patches/CVE-2016-10713.patch: fix in
src/pch.c.
- CVE-2016-10713
* SECURITY UPDATE: Input validation vulnerability
- debian/patches/CVE-2018-1000156.patch: fix in
src/pch.c adding tests in Makefile.in, tests/ed-style.
- debian/patches/0001-Fix-ed-style-test-failure.patch:
fix test.
- CVE-2018-1000156
* SECURITY UPDATE: NULL pointer dereference
- debian/patches/CVE-2018-6951.patch: fix in src/pch.c.
- CVE-2018-6951
* Adds dh_autoreconf to asure it will use the right automake, also adding
dh_autoreconf as build-depend.
2015-03-07 - Laszlo Boszormenyi (GCS) <gcs@debian.org>
patch (2.7.5-1) unstable; urgency=medium
* New upstream release.
* Fix symlink directory regression (closes: #777122).
* Update Standards-Version to 3.9.6 .
2015-02-04 - Laszlo Boszormenyi (GCS) <gcs@debian.org>
patch (2.7.4-2) unstable; urgency=low
* Backport test suite fixes.
2015-01-31 - Laszlo Boszormenyi (GCS) <gcs@debian.org>
patch (2.7.4-1) unstable; urgency=high
* New upstream release.
* Fix symlink handling (closes: #776257).
* Fix infinite loop with fuzzed diff (closes: #776271).
2015-01-23 - Laszlo Boszormenyi (GCS) <gcs@debian.org>
patch (2.7.3-1) unstable; urgency=high
* New upstream release with security fixes:
- fix all cases of CVE-2015-1196 (closes: #775873, #775901),
- fix infinite loop while applying patch, CVE-2014-9637.
* Remove outdated disable-update-version and add_manpage_time.patch
Debian patches.
* Add homepage field.
* Add watch file.
2015-01-20 - Laszlo Boszormenyi (GCS) <gcs@debian.org>
patch (2.7.1-7) unstable; urgency=high
* Backport patches from upstream Git tree:
- fix CVE-2015-119: directory traversal via symlinks (closes: #775227),
- infinite loop while applying patch (closes: #775540),
- segmentation fault while applying corrupted patch (closes: #775793).
2014-08-10 - Laszlo Boszormenyi (GCS) <gcs@debian.org>
patch (2.7.1-6) unstable; urgency=medium
* Fix ed check during build (closes: #721429, #729132).
2014-04-14 - Laszlo Boszormenyi (GCS) <gcs@debian.org>
patch (2.7.1-5) unstable; urgency=low
* Add watch file.
[ James Hunt <james.hunt@ubuntu.com> ]
* Fix segfault due to incorrect usage (closes: #742470).
2013-11-04 - Laszlo Boszormenyi (GCS) <gcs@debian.org>
patch (2.7.1-4) unstable; urgency=low
* New maintainer (closes: #728664).
* Add manual last change date (closes: #674052).
* Update Standards-Version to 3.9.5 .

See Also

Package Description
pciutils_3.3.1-1.1ubuntu1.3_i386.deb Linux PCI Utilities
perl-base_5.22.1-9ubuntu0.6_i386.deb minimal Perl system
perl-debug_5.22.1-9ubuntu0.6_i386.deb debug-enabled Perl interpreter
perl-doc_5.22.1-9ubuntu0.6_all.deb Perl documentation
perl-modules-5.22_5.22.1-9ubuntu0.6_all.deb Core Perl modules
perl_5.22.1-9ubuntu0.6_i386.deb Larry Wall's Practical Extraction and Report Language
php-all-dev_35ubuntu6.1_all.deb package depending on all supported PHP development packages
php-cgi_7.0+35ubuntu6.1_all.deb server-side, HTML-embedded scripting language (CGI binary) (default)
php-cli_7.0+35ubuntu6.1_all.deb command-line interpreter for the PHP scripting language (default)
php-common_35ubuntu6.1_all.deb Common files for PHP packages
php-curl_7.0+35ubuntu6.1_all.deb CURL module for PHP [default]
php-dev_7.0+35ubuntu6.1_all.deb Files for PHP module development (default)
php-gd_7.0+35ubuntu6.1_all.deb GD module for PHP [default]
php-gmp_7.0+35ubuntu6.1_all.deb GMP module for PHP [default]
php-ldap_7.0+35ubuntu6.1_all.deb LDAP module for PHP [default]
Advertisement
Advertisement