- Timestamp:
- 10/07/2004 07:56:23 PM (20 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- b1a168db
- Parents:
- c1ed818
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
basicnet/netprogs/cvs.xml
rc1ed818 r43a4bfad 39 39 </sect3> 40 40 41 <sect3><title>Additional downloads</title> 42 <itemizedlist spacing='compact'> 43 <listitem><para>Recommended patch: <ulink 44 url="&patch-root;/cvs-&cvs-version;-zlib-1.patch"/> 45 </para></listitem> 46 </itemizedlist></sect3> 47 41 48 <sect3><title><application>CVS</application> dependencies</title> 42 49 <sect4><title>Optional</title> … … 55 62 <sect2> 56 63 <title>Installation of <application><acronym>CVS</acronym></application></title> 64 65 <para>By default <application><acronym>CVS</acronym></application> 66 is statically linked against the zlib library included in its source 67 tree. This makes it exposed to possible security vulnerabilities in that 68 library. If you want to modify CVS to use the newest system shared zlib 69 library apply the following patch:</para> 70 71 <screen><userinput><command>patch -Np1 -i ../cvs-&cvs-version;-zlib-1.patch</command></userinput></screen> 57 72 58 73 <para>Install <application><acronym>cvs</acronym></application> by running the following commands:</para>
Note:
See TracChangeset
for help on using the changeset viewer.