summaryrefslogtreecommitdiffstats
path: root/ChangeLog.rss
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2022-03-30 22:37:05 +0000
committer Eric Hameleers <alien@slackware.com>2022-03-31 06:59:46 +0200
commit20f8c8e77495af3d80549ad1387c560581bc0b31 (patch)
treebbd95a42311104542b512fdfd2f019c34418a47d /ChangeLog.rss
parentf1c0c4aac5baeb5f422f8668a863d8f2eeb2edde (diff)
downloadcurrent-20f8c8e77495af3d80549ad1387c560581bc0b31.tar.gz
current-20f8c8e77495af3d80549ad1387c560581bc0b31.tar.xz
Wed Mar 30 22:37:05 UTC 202220220330223705
ap/vim-8.2.4649-x86_64-1.txz: Upgraded. Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646. This vulnerability is capable of crashing software, bypassing protection mechanisms, modifying memory, and possibly execution of arbitrary code. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154 https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 (* Security fix *) d/cmake-3.23.0-x86_64-1.txz: Upgraded. d/meson-0.61.4-x86_64-1.txz: Upgraded. l/harfbuzz-4.2.0-x86_64-1.txz: Upgraded. l/libcap-ng-0.8.3-x86_64-1.txz: Upgraded. l/mlt-7.6.0-x86_64-1.txz: Upgraded. x/xdg-desktop-portal-1.14.2-x86_64-1.txz: Upgraded. xap/vim-gvim-8.2.4649-x86_64-1.txz: Upgraded.
Diffstat (limited to 'ChangeLog.rss')
-rw-r--r--ChangeLog.rss31
1 files changed, 29 insertions, 2 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 10f274872..521c86d0f 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,37 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Tue, 29 Mar 2022 20:16:24 GMT</pubDate>
- <lastBuildDate>Wed, 30 Mar 2022 04:59:44 GMT</lastBuildDate>
+ <pubDate>Wed, 30 Mar 2022 22:37:05 GMT</pubDate>
+ <lastBuildDate>Thu, 31 Mar 2022 04:59:45 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Wed, 30 Mar 2022 22:37:05 GMT</title>
+ <pubDate>Wed, 30 Mar 2022 22:37:05 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20220330223705</link>
+ <guid isPermaLink="false">20220330223705</guid>
+ <description>
+ <![CDATA[<pre>
+ap/vim-8.2.4649-x86_64-1.txz: Upgraded.
+ Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646.
+ This vulnerability is capable of crashing software, bypassing protection
+ mechanisms, modifying memory, and possibly execution of arbitrary code.
+ Thanks to marav for the heads-up.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
+ https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
+ https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
+ (* Security fix *)
+d/cmake-3.23.0-x86_64-1.txz: Upgraded.
+d/meson-0.61.4-x86_64-1.txz: Upgraded.
+l/harfbuzz-4.2.0-x86_64-1.txz: Upgraded.
+l/libcap-ng-0.8.3-x86_64-1.txz: Upgraded.
+l/mlt-7.6.0-x86_64-1.txz: Upgraded.
+x/xdg-desktop-portal-1.14.2-x86_64-1.txz: Upgraded.
+xap/vim-gvim-8.2.4649-x86_64-1.txz: Upgraded.
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Tue, 29 Mar 2022 20:16:24 GMT</title>
<pubDate>Tue, 29 Mar 2022 20:16:24 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20220329201624</link>