diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-03-30 22:37:05 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-03-31 13:29:48 +0200 |
commit | 287bf2688a66ef594d63776ba1b09ec52612c9dd (patch) | |
tree | 7f71d336978d5e1c88f9baa1ded36ac4a393eec6 /ChangeLog.rss | |
parent | 64d851e17a86f13f77387a62a782a53f28399d26 (diff) | |
download | current-287bf2688a66ef594d63776ba1b09ec52612c9dd.tar.gz current-287bf2688a66ef594d63776ba1b09ec52612c9dd.tar.xz |
Wed Mar 30 22:37:05 UTC 202220220330223705_15.0
patches/packages/vim-8.2.4649-x86_64-1_slack15.0.txz: Upgraded.
Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646.
This vulnerability is capable of crashing software, bypassing protection
mechanisms, modifying memory, and possibly execution of arbitrary code.
Thanks to marav for the heads-up.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
(* Security fix *)
patches/packages/vim-gvim-8.2.4649-x86_64-1_slack15.0.txz: Upgraded.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 25 |
1 files changed, 23 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 922fdcc5b..a098a0587 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,31 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Mon, 28 Mar 2022 19:33:46 GMT</pubDate> - <lastBuildDate>Tue, 29 Mar 2022 11:29:37 GMT</lastBuildDate> + <pubDate>Wed, 30 Mar 2022 22:37:05 GMT</pubDate> + <lastBuildDate>Thu, 31 Mar 2022 11:29:37 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Wed, 30 Mar 2022 22:37:05 GMT</title> + <pubDate>Wed, 30 Mar 2022 22:37:05 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20220330223705</link> + <guid isPermaLink="false">20220330223705</guid> + <description> + <![CDATA[<pre> +patches/packages/vim-8.2.4649-x86_64-1_slack15.0.txz: Upgraded. + Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646. + This vulnerability is capable of crashing software, bypassing protection + mechanisms, modifying memory, and possibly execution of arbitrary code. + Thanks to marav for the heads-up. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154 + https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 + https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 + (* Security fix *) +patches/packages/vim-gvim-8.2.4649-x86_64-1_slack15.0.txz: Upgraded. + </pre>]]> + </description> + </item> + <item> <title>Mon, 28 Mar 2022 19:33:46 GMT</title> <pubDate>Mon, 28 Mar 2022 19:33:46 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20220328193346</link> |