Versions Packages Information History CVEs Related Badges Report

Packages for patch

252 package(s) known

patch

2.7.6 Potentially vulnerable (2.7.6-r5)

patch-dbg

2.7.6 Potentially vulnerable (2.7.6-r5)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r5)

patch

2.7.6 Potentially vulnerable (2.7.6-1)

patch

2.7.5 Potentially vulnerable (2.7.5-1)

patch

2.7.3 Potentially vulnerable (2.7.3-1)

patch

2.7.2 Potentially vulnerable (2.7.2-1)

patch

2.7.1 Potentially vulnerable (2.7.1-1)

patch

2.7 Potentially vulnerable (2.7-1)

patch

2.6.1 Potentially vulnerable (2.6.1-1)

patch

2.6 Potentially vulnerable (2.6-1)

patch

2.5.9 Potentially vulnerable (2.5.9-1)

patch

2.7.6 Potentially vulnerable (2.7.6-1)

patch

2.7.6 Potentially vulnerable (2.7.6-11.el8)
AlmaLinux 9
AppStream

patch

2.7.6 Potentially vulnerable (2.7.6-16.el9)

patch

2.7.6 Potentially vulnerable (2.7.6-r4)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r4)

patch

2.7.6 Potentially vulnerable (2.7.6-r6)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r6)

patch

2.7.6 Potentially vulnerable (2.7.6-r6)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r6)

patch

2.7.6 Potentially vulnerable (2.7.6-r7)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r7)

patch

2.7.6 Potentially vulnerable (2.7.6-r7)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r7)

patch

2.7.6 Potentially vulnerable (2.7.6-r7)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r7)

patch

2.7.6 Potentially vulnerable (2.7.6-r7)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r7)

patch

2.7.6 Potentially vulnerable (2.7.6-r7)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r7)

patch

2.7.6 Potentially vulnerable (2.7.6-r7)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r7)

patch

2.7.6 Potentially vulnerable (2.7.6-r9)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r9)

patch

2.7.6 Potentially vulnerable (2.7.6-r10)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r10)

patch

2.7.6 Potentially vulnerable (2.7.6-r10)

patch-doc

2.7.6 Potentially vulnerable (2.7.6-r10)

patch

2.7.6.0.24.76e7 (2.7.6.0.24.76e7-alt1)

patch

2.7.6.0.27.7623 (2.7.6.0.27.7623-alt1)

patch

2.7.6.0.27.7623 (2.7.6.0.27.7623-alt1)

patch

2.7.1 Potentially vulnerable (2.7.1-8.9.amzn1)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-12.14.amzn1)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-10.10.amzn1)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-12.amzn2.0.2)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-10.amzn2.0.2)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-12.amzn2)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-10.amzn2)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-8.amzn2)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):
Apertis v2021
v2021/development

patch

2.7.6 Potentially vulnerable (2.7.6-3+deb10u1+apertis1)
Apertis v2022
v2022/development

patch

2.7.6 Potentially vulnerable (2.7.6-7apertis0)
Apertis v2023
v2023/development

patch

2.7.6 Potentially vulnerable (2.7.6-7apertis0)
Apertis v2024 Development
v2024dev1/development

patch

2.7.6 Potentially vulnerable (2.7.6-7apertis0)
Arch
core

patch

2.7.6 Potentially vulnerable (2.7.6-10)

patch

2.7.6 Potentially vulnerable (2.7.6-10.0)

patch

2.7.6 Potentially vulnerable (2.7.6-10.0)

patch

2.7.6 Potentially vulnerable (2.7.6-10.0)

patch

2.7.6 Potentially vulnerable (2.7.6-10)

patch

2.7.6 Potentially vulnerable (2.7.6-10)
  • Summary:
    A utility to apply patch files to original sources
  • License:
    • GPL
  • Link(s):

patch

2.7.6 Potentially vulnerable (2.7.6-10)
  • Summary:
    A utility to apply patch files to original sources
  • License:
    • GPL
  • Link(s):

patch

2.7.6 Potentially vulnerable (2.7.6-10)
  • Summary:
    A utility to apply patch files to original sources
  • License:
    • GPL
  • Link(s):

patch-git

2.7.6.r29.gc835ecc (2.7.6.r29.gc835ecc-1)
Artix
system

patch

2.7.6 Potentially vulnerable (2.7.6-10)
  • Summary:
    A utility to apply patch files to original sources
  • License:
    • GPL
  • Link(s):

patch

2.6 Potentially vulnerable (2.6-8.el6_9)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv2+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-12.el7_7)
CentOS 8
BaseOS

patch

2.7.6 Potentially vulnerable (2.7.6-11.el8)

patch

2.7.6 Potentially vulnerable (2.7.6-11.el8)
CentOS Stream 9
AppStream

patch

2.7.6 Potentially vulnerable (2.7.6-16.el9)

GNU Patch for Windows

2.5.9 Potentially vulnerable

patch

2.7.6 Potentially vulnerable (2.7.6-17)

patch-debuginfo

2.7.6 Potentially vulnerable (2.7.6-17)
Debian 10
buster/updates/main

patch

2.7.6 Potentially vulnerable (2.7.6-3+deb10u1)
Deepin
main

patch

2.7.6 Potentially vulnerable (2.7.6-3+deb10u1)
Devuan 3.0
beowulf/main

patch

2.7.6 Potentially vulnerable (2.7.6-3+deb10u1)
Devuan 4.0
chimaera/main

patch

2.7.6 Potentially vulnerable (2.7.6-7)
Devuan Unstable
unstable/main

patch

2.7.6 Potentially vulnerable (2.7.6-7)
Entware
armv7sf-k3.2

patch

2.7.6 Potentially vulnerable (2.7.6-7a)
Entware
mipselsf-k3.4

patch

2.7.6 Potentially vulnerable (2.7.6-7a)
Entware
mipssf-k3.4

patch

2.7.6 Potentially vulnerable (2.7.6-7a)
Entware
x64-k3.2

patch

2.7.6 Potentially vulnerable (2.7.6-7a)
Entware
aarch64-k3.10

patch

2.7.6 Potentially vulnerable (2.7.6-7a)
Entware
armv5sf-k3.2

patch

2.7.6 Potentially vulnerable (2.7.6-7a)
Entware
armv7sf-k2.6

patch

2.7.6 Potentially vulnerable (2.7.6-7a)

patch

2.7.6 Potentially vulnerable (2.7.6-11.el8)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.6 Potentially vulnerable (2.7.6-9.el8_0)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):
EuroLinux 9
appstream

patch

2.7.6 Potentially vulnerable (2.7.6-16.el9)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Unspecified
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.6 Potentially vulnerable (2.7.6-16.el9)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Unspecified
  • License:
    • GPLv3+
  • Link(s):
Exherbo
arbor

sys-devel/patch

2.7.6 Potentially vulnerable
Fedora 26
updates

patch

2.7.6 Potentially vulnerable (2.7.6-4.fc26)
Fedora 26
release

patch

2.7.5 Potentially vulnerable (2.7.5-4.fc26)
Fedora 27
updates

patch

2.7.6 Potentially vulnerable (2.7.6-5.fc27)
Fedora 27
release

patch

2.7.5 Potentially vulnerable (2.7.5-6.fc27)
Fedora 28
updates

patch

2.7.6 Potentially vulnerable (2.7.6-8.fc28)
Fedora 28
release

patch

2.7.6 Potentially vulnerable (2.7.6-3.fc28)
Fedora 29
release

patch

2.7.6 Potentially vulnerable (2.7.6-5.fc29)
Fedora 29
updates

patch

2.7.6 Potentially vulnerable (2.7.6-8.fc29)
Fedora 30
release

patch

2.7.6 Potentially vulnerable (2.7.6-9.fc30)
Fedora 30
updates

patch

2.7.6 Potentially vulnerable (2.7.6-11.fc30)
Fedora 31
release

patch

2.7.6 Potentially vulnerable (2.7.6-11.fc31)
Fedora 32
release

patch

2.7.6 Potentially vulnerable (2.7.6-12.fc32)
Fedora 33
release

patch

2.7.6 Potentially vulnerable (2.7.6-13.fc33)
Fedora 34
release

patch

2.7.6 Potentially vulnerable (2.7.6-14.fc34)
Fedora 35
release

patch

2.7.6 Potentially vulnerable (2.7.6-15.fc35)
Fedora 36
release

patch

2.7.6 Potentially vulnerable (2.7.6-16.fc36)
Fedora 37
release

patch

2.7.6 Potentially vulnerable (2.7.6-17.fc37)
Fedora 38
release

patch

2.7.6 Potentially vulnerable (2.7.6-19.fc38)
Fedora 39
development

patch

2.7.6 Potentially vulnerable (2.7.6-22.fc39)
Fedora Rawhide
development

patch

2.7.6 Potentially vulnerable (2.7.6-22.fc39)

devel/patch

2.7.6 Potentially vulnerable (2.7.6_2)

sys-devel/patch

2.7.6 Potentially vulnerable (2.7.6-r4)

sys-devel/patch

2.7.6 Potentially vulnerable (2.7.6-r5)

patch

2.7.6 Potentially vulnerable

Patch

2.6.1 Potentially vulnerable
HP-UX 11.31
hppa_32

patch

2.7.6 Potentially vulnerable
HP-UX 11.31
ia64_64

patch

2.7.6 Potentially vulnerable
HP-UX 11.31
hppa_32

patch

2.7.5 Potentially vulnerable
HP-UX 11.31
ia64_32

patch

2.7.5 Potentially vulnerable
HP-UX 11.31
ia64_64

patch

2.7.5 Potentially vulnerable
HP-UX 11.31
hppa_32

patch

2.7.1 Potentially vulnerable

patch-gnu

2.7.5 Potentially vulnerable (2.7.5-4)

patch

2.7.6 Potentially vulnerable (2.7.6-7)
KaOS
core

patch

2.7.6 Potentially vulnerable (2.7.6-4)

sys-devel/patch

2.7.6 Potentially vulnerable (2.7.6-r5)

sys-devel/patch

2.7.6 Potentially vulnerable (2.7.6-r4)

sys-devel/patch

2.7.6 Potentially vulnerable (2.7.6-r4)

sys-devel/patch

2.7.6 Potentially vulnerable (2.7.6-r5)
Mageia 8
core/release

patch

2.7.6 Potentially vulnerable (2.7.6-6.mga8)
Mageia cauldron
core/release

patch

2.7.6 Potentially vulnerable (2.7.6-7.mga9)

patch

2.7.6 Potentially vulnerable (2.7.6-10)
  • Summary:
    A utility to apply patch files to original sources
  • License:
    • GPL
  • Link(s):

patch

2.7.6 Potentially vulnerable (2.7.6-10)
  • Summary:
    A utility to apply patch files to original sources
  • License:
    • GPL
  • Link(s):

patch

2.7.6 Potentially vulnerable (2.7.6-10)
  • Summary:
    A utility to apply patch files to original sources
  • License:
    • GPL
  • Link(s):

devel/patch

2.7.6 Potentially vulnerable (2.7.6_2)

patch

2.7.6 Potentially vulnerable (2.7.6-2)

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable (2.7.6-12.oe1)

patch

2.7.6 Potentially vulnerable (2.7.6-12.oe2203)

patch

2.7.6 Potentially vulnerable
openmamba
devel

patch

2.7.6 Potentially vulnerable (2.7.6-1mamba)
OpenMandriva 4.0
main/release

patch

2.7.6 Potentially vulnerable (2.7.6-3)
OpenMandriva 4.1
main/release

patch

2.7.6 Potentially vulnerable (2.7.6-3)
OpenMandriva 4.2
main/release

patch

2.7.6 Potentially vulnerable (2.7.6-3)
OpenMandriva 4.3
main/release

patch

2.7.6 Potentially vulnerable (2.7.6-3)

patch

2.7.6 Potentially vulnerable (2.7.6-3)
OpenMandriva Cooker
main/release

patch

2.7.6 Potentially vulnerable (2.7.6-3)

patch

2.7.6 Potentially vulnerable

patch

2.7.5 Potentially vulnerable (2.7.5-8.15)
openSUSE Leap 42.3
updates/oss

patch

2.7.5 Potentially vulnerable (2.7.5-9.3.1)

patch

2.7.6 Potentially vulnerable (2.7.6-lp150.2.7)
openSUSE Leap 15.0
updates/oss

patch

2.7.6 Potentially vulnerable (2.7.6-lp150.3.3.1)

patch

2.7.6 Potentially vulnerable (2.7.6-lp151.4.63)

patch

2.7.6 Potentially vulnerable (2.7.6-lp152.5.114)

patch

2.7.6 Potentially vulnerable (2.7.6-3.5)

patch

2.7.6 Potentially vulnerable (2.7.6-3.5)

patch

2.7.6 Potentially vulnerable (2.7.6-150000.5.3.1)

patch

2.7.6 Potentially vulnerable (2.7.6-6.8)

patch

2.7.5 Potentially vulnerable (2.7.5-1)

patch.lha

2.6.1_01 Potentially vulnerable

patch

2.7.6 Potentially vulnerable (2.7.6-10)

patch

2.7.6 Potentially vulnerable (2.7.6-7)
Parrot
parrot-updates/main

patch

2.7.6 Potentially vulnerable (2.7.6-7)
Parrot
parrot/main

patch

2.7.6 Potentially vulnerable (2.7.6-7)

patch

2.7.6 Potentially vulnerable (2.7.6-1pclos2018)
  • Summary:
    The GNU patch command, for modifying/upgrading files
  • Category:
    • Text tools

patch

2.7.6 Potentially vulnerable

devel/patch

2.7.6 Potentially vulnerable (2.7.6nb1)

patch

2.7.6 Potentially vulnerable (2.7.6-3+deb10u1)

patch

2.7.6 Potentially vulnerable (2.7.6-7)

patch

2.7.6 Potentially vulnerable (2.7.6-7)

patch

2.7.6 Potentially vulnerable (2.7.6-7)

patch

2.7.6 Potentially vulnerable (2.7.6-7)

patch

2.7.6 Potentially vulnerable (2.7.6-11.el8)
Rocky Linux 9
AppStream

patch

2.7.6 Potentially vulnerable (2.7.6-16.el9)
Rosa 2021.1
main/release

patch

2.7.6 Potentially vulnerable (2.7.6-4)
Rosa Server 6.9
base/release

patch

2.6 Potentially vulnerable (2.6-6.res6)
Rosa Server 7.3
base/release

patch

2.7.1 Potentially vulnerable (2.7.1-8.res7)
Rosa Server 7.5
base/release

patch

2.7.1 Potentially vulnerable (2.7.1-8.res7)

patch

2.7.1 Potentially vulnerable (2.7.1-10.el7_5)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-11.el7)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-12.el7_7)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-6.el7)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.1 Potentially vulnerable (2.7.1-8.el7)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):

patch

2.7.6 Potentially vulnerable
Slackware 14.2
slackware

patch

2.7.5 Potentially vulnerable
Slackware 15.0
slackware

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable
Slackware64 14.2
slackware64

patch

2.7.5 Potentially vulnerable
Slackware64 15.0
slackware64

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.5 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch-dbginfo

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable
Trisquel 10.0
nabia/main

patch

2.7.6 Potentially vulnerable (2.7.6-6)
Trisquel 11.0
aramo/main

patch

2.7.6 Potentially vulnerable (2.7.6-7build2)
UBI 8
baseos

patch

2.7.6 Potentially vulnerable (2.7.6-11.el8)
  • Summary:
    Utility for modifying/upgrading files
  • Category:
    • Development/Tools
  • License:
    • GPLv3+
  • Link(s):
Ubuntu 14.04
trusty/main

patch

2.7.1 Potentially vulnerable (2.7.1-4)
Ubuntu 14.04
trusty-updates/main

patch

2.7.1 Potentially vulnerable (2.7.1-4ubuntu2.4)
Ubuntu 16.04
xenial/main

patch

2.7.5 Potentially vulnerable (2.7.5-1)
Ubuntu 16.04
xenial-updates/main

patch

2.7.5 Potentially vulnerable (2.7.5-1ubuntu0.16.04.2)
Ubuntu 18.04
bionic-updates/main

patch

2.7.6 Potentially vulnerable (2.7.6-2ubuntu1.1)

patch

2.7.6 Potentially vulnerable (2.7.6_4)

patch

2.7.6 Potentially vulnerable

patch

2.7.6 Potentially vulnerable