diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-03-30 22:37:05 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-03-31 06:59:46 +0200 |
commit | 20f8c8e77495af3d80549ad1387c560581bc0b31 (patch) | |
tree | bbd95a42311104542b512fdfd2f019c34418a47d /ChangeLog.rss | |
parent | f1c0c4aac5baeb5f422f8668a863d8f2eeb2edde (diff) | |
download | current-20f8c8e77495af3d80549ad1387c560581bc0b31.tar.gz current-20f8c8e77495af3d80549ad1387c560581bc0b31.tar.xz |
Wed Mar 30 22:37:05 UTC 202220220330223705
ap/vim-8.2.4649-x86_64-1.txz: Upgraded.
Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646.
This vulnerability is capable of crashing software, bypassing protection
mechanisms, modifying memory, and possibly execution of arbitrary code.
Thanks to marav for the heads-up.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
(* Security fix *)
d/cmake-3.23.0-x86_64-1.txz: Upgraded.
d/meson-0.61.4-x86_64-1.txz: Upgraded.
l/harfbuzz-4.2.0-x86_64-1.txz: Upgraded.
l/libcap-ng-0.8.3-x86_64-1.txz: Upgraded.
l/mlt-7.6.0-x86_64-1.txz: Upgraded.
x/xdg-desktop-portal-1.14.2-x86_64-1.txz: Upgraded.
xap/vim-gvim-8.2.4649-x86_64-1.txz: Upgraded.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r-- | ChangeLog.rss | 31 |
1 files changed, 29 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss index 10f274872..521c86d0f 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,37 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Tue, 29 Mar 2022 20:16:24 GMT</pubDate> - <lastBuildDate>Wed, 30 Mar 2022 04:59:44 GMT</lastBuildDate> + <pubDate>Wed, 30 Mar 2022 22:37:05 GMT</pubDate> + <lastBuildDate>Thu, 31 Mar 2022 04:59:45 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Wed, 30 Mar 2022 22:37:05 GMT</title> + <pubDate>Wed, 30 Mar 2022 22:37:05 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20220330223705</link> + <guid isPermaLink="false">20220330223705</guid> + <description> + <![CDATA[<pre> +ap/vim-8.2.4649-x86_64-1.txz: Upgraded. + Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646. + This vulnerability is capable of crashing software, bypassing protection + mechanisms, modifying memory, and possibly execution of arbitrary code. + Thanks to marav for the heads-up. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154 + https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 + https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 + (* Security fix *) +d/cmake-3.23.0-x86_64-1.txz: Upgraded. +d/meson-0.61.4-x86_64-1.txz: Upgraded. +l/harfbuzz-4.2.0-x86_64-1.txz: Upgraded. +l/libcap-ng-0.8.3-x86_64-1.txz: Upgraded. +l/mlt-7.6.0-x86_64-1.txz: Upgraded. +x/xdg-desktop-portal-1.14.2-x86_64-1.txz: Upgraded. +xap/vim-gvim-8.2.4649-x86_64-1.txz: Upgraded. + </pre>]]> + </description> + </item> + <item> <title>Tue, 29 Mar 2022 20:16:24 GMT</title> <pubDate>Tue, 29 Mar 2022 20:16:24 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20220329201624</link> |