[ Все A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Проект gmp-1:6.2.0-13.el9

Имя gmp
Эпоха 1
Версия 6.2.0
Релиз 13.el9
Сайт http://gmplib.org/
Лицензия LGPLv3+ or GPLv2+
Время сборки 2025-02-20 09:46:54
Хост сборки certified-builder01.msvsphere-os.ru
Краткое описание A GNU arbitrary precision library
Репозитории OS
Полное описание The gmp package contains GNU MP, a library for arbitrary precision arithmetic, signed integers operations, rational numbers and floating point numbers. GNU MP is designed for speed, for both small and very large operands. GNU MP is fast because it uses fullwords as the basic arithmetic type, it uses fast algorithms, it carefully optimizes assembly code for many CPUs' most common inner loops, and it generally emphasizes speed over simplicity/elegance in its operations. Install the gmp package if you need a fast arbitrary precision library.
Эррата
× Full screenshot
Пакеты link
Пакет Краткое описание Контрольная сумма SHA-256
x86_64
gmp-1:6.2.0-13.el9.x86_64 A GNU arbitrary precision library 403f77e5ce475c4c699b2cb1e04c3c477f6eb36bf56de01128c2a63d6f8d77a5 download
i686
gmp-1:6.2.0-13.el9.i686 A GNU arbitrary precision library e20a46fb86c031aee1023258208d392c979a8b8889a75bb86efac793051e7954 download
src
gmp-1:6.2.0-13.el9.src A GNU arbitrary precision library 1d5e1215a07f962d7c10b667b0a122d57fcf5d7a72e021726d021a4aebaf8db8 download
История изменений link
* Fri Sep 22 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 1:6.2.0-13
- Rebuilt for MSVSphere 9.3 beta

* Thu Aug 03 2023 Jakub Martisko <jamartis@redhat.com> - 1:6.2.0-13
- Fix: previous commit removed one function from the library and thus broke the ABI
- function gmpn_preinv_divrem_1 should now not be removed
Related: rhbz#2044216

* Tue Jul 18 2023 Jakub Martisko <jamartis@redhat.com> - 1:6.2.0-12
- Add SIMD optimization patches for s390x (provided by the IBM)
Resolves: rhbz#2044216

* Tue Jun 06 2023 Jakub Martisko <jamartis@redhat.com> - 1:6.2.0-11
Fix: Integer overflow and resultant buffer overflow via crafted input
Resolves: CVE-2021-43618