summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--ChangeLog.rss99
-rw-r--r--ChangeLog.txt87
-rw-r--r--FILELIST.TXT102
-rw-r--r--patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt (renamed from patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt)0
-rw-r--r--patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt (renamed from patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt)0
-rw-r--r--patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt (renamed from patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt)0
-rw-r--r--patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt (renamed from patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt)0
-rw-r--r--patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt (renamed from patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt)0
-rw-r--r--patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt (renamed from patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt)0
-rw-r--r--patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt (renamed from patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt)0
-rw-r--r--patches/source/vim/CVE-2022-2816.patch26
-rw-r--r--patches/source/vim/CVE-2022-2817.patch69
-rw-r--r--patches/source/vim/CVE-2022-2819.patch40
-rw-r--r--patches/source/vim/CVE-2022-2889.patch236
-rwxr-xr-xpatches/source/vim/vim-gvim.SlackBuild10
-rwxr-xr-xpatches/source/vim/vim.SlackBuild10
-rwxr-xr-xrecompress.sh4
17 files changed, 235 insertions, 448 deletions
diff --git a/ChangeLog.rss b/ChangeLog.rss
index b52ce43a7..cba63e613 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,103 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Tue, 23 Aug 2022 19:27:56 GMT</pubDate>
- <lastBuildDate>Wed, 24 Aug 2022 11:30:15 GMT</lastBuildDate>
+ <pubDate>Fri, 26 Aug 2022 04:02:20 GMT</pubDate>
+ <lastBuildDate>Sat, 27 Aug 2022 11:30:15 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Fri, 26 Aug 2022 04:02:20 GMT</title>
+ <pubDate>Fri, 26 Aug 2022 04:02:20 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20220826040220</link>
+ <guid isPermaLink="false">20220826040220</guid>
+ <description>
+ <![CDATA[<pre>
+patches/packages/linux-5.15.63/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.39:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
+ Fixed in 5.15.40:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943
+ Fixed in 5.15.41:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
+ Fixed in 5.15.42:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
+ Fixed in 5.15.44:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
+ Fixed in 5.15.45:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
+ Fixed in 5.15.46:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1973
+ Fixed in 5.15.47:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34495
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32981
+ Fixed in 5.15.48:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
+ Fixed in 5.15.53:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
+ Fixed in 5.15.54:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
+ Fixed in 5.15.56:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123
+ Fixed in 5.15.57:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
+ Fixed in 5.15.58:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
+ Fixed in 5.15.59:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
+ Fixed in 5.15.60:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
+ Fixed in 5.15.61:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
+ (* Security fix *)
+patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded.
+ We're just going to move to vim-9 instead of continuing to backport patches
+ to the vim-8 branch. Most users will be better served by this.
+ Fixed use after free and null pointer dereference.
+ Thanks to marav for the heads-up.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923
+ (* Security fix *)
+patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded.
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Tue, 23 Aug 2022 19:27:56 GMT</title>
<pubDate>Tue, 23 Aug 2022 19:27:56 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20220823192756</link>
@@ -23,7 +116,7 @@
<![CDATA[<pre>
extra/sendmail/sendmail-8.17.1-x86_64-3_slack15.0.txz: Rebuilt.
In recent versions of glibc, USE_INET6 has been removed which caused sendmail
- to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNNAME2=1 to the
+ to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNAME2=1 to the
site.config.m4 allows the reverse lookups to work again fixing this issue.
Thanks to talo.
extra/sendmail/sendmail-cf-8.17.1-noarch-3_slack15.0.txz: Rebuilt.
diff --git a/ChangeLog.txt b/ChangeLog.txt
index dfb1e7121..e2bfaba29 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,7 +1,92 @@
+Fri Aug 26 04:02:20 UTC 2022
+patches/packages/linux-5.15.63/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.39:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
+ Fixed in 5.15.40:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943
+ Fixed in 5.15.41:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
+ Fixed in 5.15.42:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
+ Fixed in 5.15.44:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
+ Fixed in 5.15.45:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
+ Fixed in 5.15.46:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1973
+ Fixed in 5.15.47:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34495
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32981
+ Fixed in 5.15.48:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
+ Fixed in 5.15.53:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
+ Fixed in 5.15.54:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
+ Fixed in 5.15.56:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123
+ Fixed in 5.15.57:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
+ Fixed in 5.15.58:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
+ Fixed in 5.15.59:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
+ Fixed in 5.15.60:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
+ Fixed in 5.15.61:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
+ (* Security fix *)
+patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded.
+ We're just going to move to vim-9 instead of continuing to backport patches
+ to the vim-8 branch. Most users will be better served by this.
+ Fixed use after free and null pointer dereference.
+ Thanks to marav for the heads-up.
+ For more information, see:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923
+ (* Security fix *)
+patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded.
++--------------------------+
Tue Aug 23 19:27:56 UTC 2022
extra/sendmail/sendmail-8.17.1-x86_64-3_slack15.0.txz: Rebuilt.
In recent versions of glibc, USE_INET6 has been removed which caused sendmail
- to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNNAME2=1 to the
+ to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNAME2=1 to the
site.config.m4 allows the reverse lookups to work again fixing this issue.
Thanks to talo.
extra/sendmail/sendmail-cf-8.17.1-noarch-3_slack15.0.txz: Rebuilt.
diff --git a/FILELIST.TXT b/FILELIST.TXT
index 3efda7a58..123a094c4 100644
--- a/FILELIST.TXT
+++ b/FILELIST.TXT
@@ -1,20 +1,20 @@
-Tue Aug 23 19:31:52 UTC 2022
+Fri Aug 26 04:06:22 UTC 2022
Here is the file list for this directory. If you are using a
mirror site and find missing or extra files in the disk
subdirectories, please have the archive administrator refresh
the mirror.
-drwxr-xr-x 12 root root 4096 2022-08-23 19:27 .
+drwxr-xr-x 12 root root 4096 2022-08-26 04:02 .
-rw-r--r-- 1 root root 5767 2022-02-02 22:44 ./ANNOUNCE.15.0
-rw-r--r-- 1 root root 16609 2022-03-30 19:03 ./CHANGES_AND_HINTS.TXT
--rw-r--r-- 1 root root 1147805 2022-08-20 20:06 ./CHECKSUMS.md5
--rw-r--r-- 1 root root 163 2022-08-20 20:06 ./CHECKSUMS.md5.asc
+-rw-r--r-- 1 root root 1148446 2022-08-23 19:32 ./CHECKSUMS.md5
+-rw-r--r-- 1 root root 163 2022-08-23 19:32 ./CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 17976 1994-06-10 02:28 ./COPYING
-rw-r--r-- 1 root root 35147 2007-06-30 04:21 ./COPYING3
-rw-r--r-- 1 root root 19573 2016-06-23 20:08 ./COPYRIGHT.TXT
-rw-r--r-- 1 root root 616 2006-10-02 04:37 ./CRYPTO_NOTICE.TXT
--rw-r--r-- 1 root root 1919299 2022-08-23 19:27 ./ChangeLog.txt
+-rw-r--r-- 1 root root 1923852 2022-08-26 04:02 ./ChangeLog.txt
drwxr-xr-x 3 root root 4096 2013-03-20 22:17 ./EFI
drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT
-rw-r--r-- 1 root root 1187840 2021-06-15 19:16 ./EFI/BOOT/bootx64.efi
@@ -25,7 +25,7 @@ drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT
-rwxr-xr-x 1 root root 2504 2019-07-05 18:54 ./EFI/BOOT/make-grub.sh
-rw-r--r-- 1 root root 10722 2013-09-21 19:02 ./EFI/BOOT/osdetect.cfg
-rw-r--r-- 1 root root 1273 2013-08-12 21:08 ./EFI/BOOT/tools.cfg
--rw-r--r-- 1 root root 1498444 2022-08-20 20:06 ./FILELIST.TXT
+-rw-r--r-- 1 root root 1499279 2022-08-23 19:31 ./FILELIST.TXT
-rw-r--r-- 1 root root 1572 2012-08-29 18:27 ./GPG-KEY
-rw-r--r-- 1 root root 864745 2022-02-02 08:25 ./PACKAGES.TXT
-rw-r--r-- 1 root root 8034 2022-02-02 03:36 ./README.TXT
@@ -737,13 +737,13 @@ drwxr-xr-x 2 root root 4096 2008-05-07 05:21 ./pasture/source/php/pear
-rwxr-xr-x 1 root root 9448 2018-05-16 22:38 ./pasture/source/php/php.SlackBuild
-rw-r--r-- 1 root root 775 2017-07-07 19:25 ./pasture/source/php/php.ini-development.diff.gz
-rw-r--r-- 1 root root 830 2005-12-09 05:18 ./pasture/source/php/slack-desc
-drwxr-xr-x 4 root root 4096 2022-08-23 19:31 ./patches
--rw-r--r-- 1 root root 44742 2022-08-23 19:31 ./patches/CHECKSUMS.md5
--rw-r--r-- 1 root root 163 2022-08-23 19:31 ./patches/CHECKSUMS.md5.asc
--rw-r--r-- 1 root root 59993 2022-08-23 19:31 ./patches/FILE_LIST
--rw-r--r-- 1 root root 11256639 2022-08-23 19:31 ./patches/MANIFEST.bz2
--rw-r--r-- 1 root root 34149 2022-08-23 19:31 ./patches/PACKAGES.TXT
-drwxr-xr-x 3 root root 16384 2022-08-23 19:31 ./patches/packages
+drwxr-xr-x 4 root root 4096 2022-08-26 04:06 ./patches
+-rw-r--r-- 1 root root 44462 2022-08-26 04:06 ./patches/CHECKSUMS.md5
+-rw-r--r-- 1 root root 163 2022-08-26 04:06 ./patches/CHECKSUMS.md5.asc
+-rw-r--r-- 1 root root 59645 2022-08-26 04:06 ./patches/FILE_LIST
+-rw-r--r-- 1 root root 11248002 2022-08-26 04:06 ./patches/MANIFEST.bz2
+-rw-r--r-- 1 root root 34149 2022-08-26 04:06 ./patches/PACKAGES.TXT
+drwxr-xr-x 3 root root 16384 2022-08-26 04:05 ./patches/packages
-rw-r--r-- 1 root root 327 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txt
-rw-r--r-- 1 root root 10716 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz.asc
@@ -810,22 +810,22 @@ drwxr-xr-x 3 root root 16384 2022-08-23 19:31 ./patches/packages
-rw-r--r-- 1 root root 219 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 375568 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz.asc
-drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15.38
--rw-r--r-- 1 root root 624 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt
--rw-r--r-- 1 root root 8218112 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz
--rw-r--r-- 1 root root 163 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz.asc
--rw-r--r-- 1 root root 332 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt
--rw-r--r-- 1 root root 1078936 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz
--rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz.asc
--rw-r--r-- 1 root root 636 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt
--rw-r--r-- 1 root root 12157884 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz
--rw-r--r-- 1 root root 163 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz.asc
--rw-r--r-- 1 root root 567 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt
--rw-r--r-- 1 root root 50239932 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz
--rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz.asc
--rw-r--r-- 1 root root 317 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt
--rw-r--r-- 1 root root 123035916 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz
--rw-r--r-- 1 root root 163 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz.asc
+drwxr-xr-x 2 root root 4096 2022-08-26 04:06 ./patches/packages/linux-5.15.63
+-rw-r--r-- 1 root root 624 2022-08-26 01:49 ./patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt
+-rw-r--r-- 1 root root 8467508 2022-08-26 01:49 ./patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2022-08-26 01:49 ./patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 332 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt
+-rw-r--r-- 1 root root 1079428 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txz
+-rw-r--r-- 1 root root 163 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txz.asc
+-rw-r--r-- 1 root root 636 2022-08-26 01:46 ./patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt
+-rw-r--r-- 1 root root 12504496 2022-08-26 01:46 ./patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2022-08-26 01:46 ./patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 567 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt
+-rw-r--r-- 1 root root 51351084 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 317 2022-08-26 01:41 ./patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt
+-rw-r--r-- 1 root root 123142872 2022-08-26 01:41 ./patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txz
+-rw-r--r-- 1 root root 163 2022-08-26 01:41 ./patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txz.asc
-rw-r--r-- 1 root root 369 2022-08-16 18:26 ./patches/packages/mariadb-10.5.17-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 29383552 2022-08-16 18:26 ./patches/packages/mariadb-10.5.17-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-08-16 18:26 ./patches/packages/mariadb-10.5.17-x86_64-1_slack15.0.txz.asc
@@ -877,12 +877,12 @@ drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15
-rw-r--r-- 1 root root 354 2022-02-15 18:37 ./patches/packages/util-linux-2.37.4-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 2805300 2022-02-15 18:37 ./patches/packages/util-linux-2.37.4-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-02-15 18:37 ./patches/packages/util-linux-2.37.4-x86_64-1_slack15.0.txz.asc
--rw-r--r-- 1 root root 383 2022-08-20 18:51 ./patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt
--rw-r--r-- 1 root root 8141876 2022-08-20 18:51 ./patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txz
--rw-r--r-- 1 root root 163 2022-08-20 18:51 ./patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txz.asc
--rw-r--r-- 1 root root 503 2022-08-20 18:52 ./patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt
--rw-r--r-- 1 root root 1659760 2022-08-20 18:52 ./patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txz
--rw-r--r-- 1 root root 163 2022-08-20 18:52 ./patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txz.asc
+-rw-r--r-- 1 root root 383 2022-08-26 03:34 ./patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt
+-rw-r--r-- 1 root root 8408256 2022-08-26 03:34 ./patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz
+-rw-r--r-- 1 root root 163 2022-08-26 03:34 ./patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz.asc
+-rw-r--r-- 1 root root 503 2022-08-26 03:35 ./patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt
+-rw-r--r-- 1 root root 1682320 2022-08-26 03:35 ./patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz
+-rw-r--r-- 1 root root 163 2022-08-26 03:35 ./patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz.asc
-rw-r--r-- 1 root root 507 2022-07-10 18:40 ./patches/packages/wavpack-5.5.0-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 185936 2022-07-10 18:40 ./patches/packages/wavpack-5.5.0-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-07-10 18:40 ./patches/packages/wavpack-5.5.0-x86_64-1_slack15.0.txz.asc
@@ -907,7 +907,7 @@ drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15
-rw-r--r-- 1 root root 388 2022-08-09 17:48 ./patches/packages/zlib-1.2.12-x86_64-2_slack15.0.txt
-rw-r--r-- 1 root root 105196 2022-08-09 17:48 ./patches/packages/zlib-1.2.12-x86_64-2_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-08-09 17:48 ./patches/packages/zlib-1.2.12-x86_64-2_slack15.0.txz.asc
-drwxr-xr-x 46 root root 4096 2022-08-23 19:23 ./patches/source
+drwxr-xr-x 46 root root 4096 2022-08-26 03:43 ./patches/source
drwxr-xr-x 2 root root 4096 2022-01-16 05:07 ./patches/source/aaa_base
-rw-r--r-- 1 root root 11041 2022-02-15 04:49 ./patches/source/aaa_base/_aaa_base.tar.gz
-rwxr-xr-x 1 root root 3894 2022-02-15 05:07 ./patches/source/aaa_base/aaa_base.SlackBuild
@@ -1308,19 +1308,15 @@ drwxr-xr-x 2 root root 4096 2020-05-08 19:39 ./patches/source/util-linux/p
-rw-r--r-- 1 root root 335 2014-07-03 08:34 ./patches/source/util-linux/util-linux.fdisk-no-solaris.diff.gz
-rw-r--r-- 1 root root 10292 2009-05-30 01:25 ./patches/source/util-linux/ziptool-1.4.0.tar.xz
-rw-r--r-- 1 root root 386 2009-05-30 01:25 ./patches/source/util-linux/ziptool-fix_build.patch.gz
-drwxr-xr-x 2 root root 4096 2022-08-20 18:50 ./patches/source/vim
--rw-r--r-- 1 root root 547 2022-08-17 19:02 ./patches/source/vim/CVE-2022-2816.patch.gz
--rw-r--r-- 1 root root 1105 2022-08-17 19:03 ./patches/source/vim/CVE-2022-2817.patch.gz
--rw-r--r-- 1 root root 687 2022-08-17 19:03 ./patches/source/vim/CVE-2022-2819.patch.gz
--rw-r--r-- 1 root root 2343 2022-08-20 18:50 ./patches/source/vim/CVE-2022-2889.patch.gz
+drwxr-xr-x 2 root root 4096 2022-08-26 03:29 ./patches/source/vim
-rw-r--r-- 1 root root 299348 2009-07-09 22:03 ./patches/source/vim/ctags-5.8.tar.xz
-rw-r--r-- 1 root root 2768 2022-02-12 08:11 ./patches/source/vim/ctags.use-conventional-unused-marker.patch.gz
-rw-r--r-- 1 root root 8249 2006-01-19 17:01 ./patches/source/vim/gvim.png
-rw-r--r-- 1 root root 834 2018-02-27 06:13 ./patches/source/vim/slack-desc.vim
-rw-r--r-- 1 root root 959 2018-03-15 02:41 ./patches/source/vim/slack-desc.vim-gvim
--rw-r--r-- 1 root root 10400559 2022-03-30 18:17 ./patches/source/vim/vim-8.2.4649.tar.lz
--rwxr-xr-x 1 root root 6654 2022-08-20 18:44 ./patches/source/vim/vim-gvim.SlackBuild
--rwxr-xr-x 1 root root 8218 2022-08-20 18:44 ./patches/source/vim/vim.SlackBuild
+-rw-r--r-- 1 root root 10692405 2022-08-26 02:43 ./patches/source/vim/vim-9.0.0270.tar.lz
+-rwxr-xr-x 1 root root 6370 2022-08-24 18:49 ./patches/source/vim/vim-gvim.SlackBuild
+-rwxr-xr-x 1 root root 7934 2022-08-24 18:49 ./patches/source/vim/vim.SlackBuild
-rw-r--r-- 1 root root 283 2019-01-11 20:43 ./patches/source/vim/vim.vimrc.diff.gz
drwxr-xr-x 2 root root 4096 2022-07-10 18:34 ./patches/source/wavpack
-rw-r--r-- 1 root root 963 2019-12-19 18:54 ./patches/source/wavpack/slack-desc
@@ -2739,9 +2735,9 @@ drwxr-xr-x 2 root root 69632 2022-02-01 08:29 ./slackware64/kde
-rw-r--r-- 1 root root 163 2022-01-06 22:29 ./slackware64/kde/kigo-21.12.1-x86_64-1.txz.asc
-rw-r--r-- 1 root root 216 2021-12-26 20:10 ./slackware64/kde/kile-2.9.93-x86_64-15.txt
-rw-r--r-- 1 root root 7406860 2021-12-26 20:10 ./slackware64/kde/kile-2.9.93-x86_64-15.txz
--rw-r--r-- 1 root root 163 2021-12-26 20:10 ./slackware64/kde/kile-2.9.93-x86_64-15.txz.asc
--rw-r--r-- 1 root root 198 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txt
--rw-r--r-- 1 root root 1347260 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2021-12-26 20:10 ./slackware64/kde/kile-2.9.93-x86_64-15.txz.asc
+-rw-r--r-- 1 root root 198 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txt
+-rw-r--r-- 1 root root 1347260 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txz.asc
-rw-r--r-- 1 root root 429 2022-01-08 22:35 ./slackware64/kde/kimageformats-5.90.0-x86_64-1.txt
-rw-r--r-- 1 root root 118812 2022-01-08 22:35 ./slackware64/kde/kimageformats-5.90.0-x86_64-1.txz
@@ -5494,9 +5490,9 @@ drwxr-xr-x 2 root root 65536 2022-02-01 04:47 ./slackware64/x
-rw-r--r-- 1 root root 2551752 2021-02-13 12:59 ./slackware64/x/motif-2.3.8-x86_64-5.txz
-rw-r--r-- 1 root root 163 2021-02-13 12:59 ./slackware64/x/motif-2.3.8-x86_64-5.txz.asc
-rw-r--r-- 1 root root 583 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txt
--rw-r--r-- 1 root root 22116 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txz
--rw-r--r-- 1 root root 163 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txz.asc
--rw-r--r-- 1 root root 340 2021-02-13 12:59 ./slackware64/x/mypaint-brushes-1.3.0-noarch-3.txt
+-rw-r--r-- 1 root root 22116 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txz
+-rw-r--r-- 1 root root 163 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txz.asc
+-rw-r--r-- 1 root root 340 2021-02-13 12:59 ./slackware64/x/mypaint-brushes-1.3.0-noarch-3.txt
-rw-r--r-- 1 root root 2346676 2021-02-13 12:59 ./slackware64/x/mypaint-brushes-1.3.0-noarch-3.txz
-rw-r--r-- 1 root root 163 2021-02-13 12:59 ./slackware64/x/mypaint-brushes-1.3.0-noarch-3.txz.asc
-rw-r--r-- 1 root root 803 2021-02-13 13:00 ./slackware64/x/noto-cjk-fonts-ttf-2.001-noarch-3.txt
@@ -15108,9 +15104,9 @@ drwxr-xr-x 2 root root 4096 2021-12-10 20:40 ./source/x/x11/src/lib
-rw-r--r-- 1 root root 439404 2020-02-22 20:51 ./source/x/x11/src/lib/libxcb-1.14.tar.xz
-rw-r--r-- 1 root root 302836 2019-03-16 18:36 ./source/x/x11/src/lib/libxkbfile-1.1.0.tar.xz
-rw-r--r-- 1 root root 250612 2018-02-26 17:27 ./source/x/x11/src/lib/libxshmfence-1.3.tar.xz
--rw-r--r-- 1 root root 634752 2020-04-19 21:56 ./source/x/x11/src/lib/pixman-0.40.0.tar.xz
--rw-r--r-- 1 root root 169464 2019-03-16 21:30 ./source/x/x11/src/lib/xtrans-1.4.0.tar.xz
-drwxr-xr-x 2 root root 4096 2021-09-20 18:27 ./source/x/x11/src/proto
+-rw-r--r-- 1 root root 634752 2020-04-19 21:56 ./source/x/x11/src/lib/pixman-0.40.0.tar.xz
+-rw-r--r-- 1 root root 169464 2019-03-16 21:30 ./source/x/x11/src/lib/xtrans-1.4.0.tar.xz
+drwxr-xr-x 2 root root 4096 2021-09-20 18:27 ./source/x/x11/src/proto
-rw-r--r-- 1 root root 143588 2020-10-08 22:32 ./source/x/x11/src/proto/xcb-proto-1.14.1.tar.xz
-rw-r--r-- 1 root root 763248 2021-09-15 15:59 ./source/x/x11/src/proto/xorgproto-2021.5.tar.xz
drwxr-xr-x 2 root root 4096 2021-08-02 18:03 ./source/x/x11/src/util
diff --git a/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt b/patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt
index 975a5ba6d..975a5ba6d 100644
--- a/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt
+++ b/patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt
diff --git a/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt b/patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt
index 27b46a0e6..27b46a0e6 100644
--- a/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt
+++ b/patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt
diff --git a/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt b/patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt
index 2d6170611..2d6170611 100644
--- a/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt
+++ b/patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt
diff --git a/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt b/patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt
index 9a9441043..9a9441043 100644
--- a/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt
+++ b/patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt
diff --git a/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt b/patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt
index eb2b0a30c..eb2b0a30c 100644
--- a/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt
+++ b/patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt
diff --git a/patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt b/patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt
index 4a843388d..4a843388d 100644
--- a/patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt
+++ b/patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt
diff --git a/patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt b/patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt
index 3b81553b1..3b81553b1 100644
--- a/patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt
+++ b/patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt
diff --git a/patches/source/vim/CVE-2022-2816.patch b/patches/source/vim/CVE-2022-2816.patch
deleted file mode 100644
index da790fb6d..000000000
--- a/patches/source/vim/CVE-2022-2816.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From dbdd16b62560413abcc3c8e893cc3010ccf31666 Mon Sep 17 00:00:00 2001
-From: Bram Moolenaar <Bram@vim.org>
-Date: Sun, 14 Aug 2022 21:46:07 +0100
-Subject: [PATCH] patch 9.0.0212: invalid memory access when compiling :unlet
-
-Problem: Invalid memory access when compiling :unlet.
-Solution: Don't read past the end of the line.
----
-
-diff --git a/src/vim9cmds.c b/src/vim9cmds.c
-index 35a382138bf3..93032d6bf154 100644
---- a/src/vim9cmds.c
-+++ b/src/vim9cmds.c
-@@ -92,6 +92,12 @@ free_locals(cctx_T *cctx)
- int
- check_vim9_unlet(char_u *name)
- {
-+ if (*name == NUL)
-+ {
-+ semsg(_(e_argument_required_for_str), "unlet");
-+ return FAIL;
-+ }
-+
- if (name[1] != ':' || vim_strchr((char_u *)"gwtb", *name) == NULL)
- {
- // "unlet s:var" is allowed in legacy script.
diff --git a/patches/source/vim/CVE-2022-2817.patch b/patches/source/vim/CVE-2022-2817.patch
deleted file mode 100644
index d9bfc1a66..000000000
--- a/patches/source/vim/CVE-2022-2817.patch
+++ /dev/null
@@ -1,69 +0,0 @@
-From 249e1b903a9c0460d618f6dcc59aeb8c03b24b20 Mon Sep 17 00:00:00 2001
-From: Bram Moolenaar <Bram@vim.org>
-Date: Sun, 14 Aug 2022 22:23:02 +0100
-Subject: [PATCH] patch 9.0.0213: using freed memory with error in assert
- argument
-
-Problem: Using freed memory with error in assert argument.
-Solution: Make a copy of the error.
----
-
-diff --git a/src/testdir/test_assert.vim b/src/testdir/test_assert.vim
-index 27b2d73fbfc8..7c9d090b39df 100644
---- a/src/testdir/test_assert.vim
-+++ b/src/testdir/test_assert.vim
-@@ -291,6 +291,10 @@ func Test_assert_fail_fails()
- let exp = v:exception
- endtry
- call assert_match("E1174: String required for argument 5", exp)
-+
-+ call assert_equal(1, assert_fails('c0', ['', '\1']))
-+ call assert_match("Expected '\\\\\\\\1' but got 'E939: Positive count required: c0': c0", v:errors[0])
-+ call remove(v:errors, 0)
- endfunc
-
- func Test_assert_fails_in_try_block()
-diff --git a/src/testing.c b/src/testing.c
-index f2355f5dac13..21eb9c18e6e2 100644
---- a/src/testing.c
-+++ b/src/testing.c
-@@ -597,6 +597,7 @@ f_assert_fails(typval_T *argvars, typval_T *rettv)
- int save_trylevel = trylevel;
- int called_emsg_before = called_emsg;
- char *wrong_arg_msg = NULL;
-+ char_u *tofree = NULL;
-
- if (check_for_string_or_number_arg(argvars, 0) == FAIL
- || check_for_opt_string_or_list_arg(argvars, 1) == FAIL
-@@ -660,13 +661,17 @@ f_assert_fails(typval_T *argvars, typval_T *rettv)
- }
- else if (list->lv_len == 2)
- {
-- tv = &list->lv_u.mat.lv_last->li_tv;
-- actual = get_vim_var_str(VV_ERRMSG);
-- expected = tv_get_string_buf_chk(tv, buf);
-- if (!pattern_match(expected, actual, FALSE))
-+ // make a copy, an error in pattern_match() may free it
-+ tofree = actual = vim_strsave(get_vim_var_str(VV_ERRMSG));
-+ if (actual != NULL)
- {
-- error_found = TRUE;
-- expected_str = expected;
-+ tv = &list->lv_u.mat.lv_last->li_tv;
-+ expected = tv_get_string_buf_chk(tv, buf);
-+ if (!pattern_match(expected, actual, FALSE))
-+ {
-+ error_found = TRUE;
-+ expected_str = expected;
-+ }
- }
- }
- }
-@@ -749,6 +754,7 @@ f_assert_fails(typval_T *argvars, typval_T *rettv)
- msg_scrolled = 0;
- lines_left = Rows;
- VIM_CLEAR(emsg_assert_fails_msg);
-+ vim_free(tofree);
- set_vim_var_string(VV_ERRMSG, NULL, 0);
- if (wrong_arg_msg != NULL)
- emsg(_(wrong_arg_msg));
diff --git a/patches/source/vim/CVE-2022-2819.patch b/patches/source/vim/CVE-2022-2819.patch
deleted file mode 100644
index 59c25d8c3..000000000
--- a/patches/source/vim/CVE-2022-2819.patch
+++ /dev/null
@@ -1,40 +0,0 @@
-From d1d8f6bacb489036d0fd479c9dd3c0102c988889 Mon Sep 17 00:00:00 2001
-From: Bram Moolenaar <Bram@vim.org>
-Date: Sun, 14 Aug 2022 21:28:32 +0100
-Subject: [PATCH] patch 9.0.0211: invalid memory access when compiling :lockvar
-
-Problem: Invalid memory access when compiling :lockvar.
-Solution: Don't read past the end of the line.
----
-
-diff --git a/src/vim9cmds.c b/src/vim9cmds.c
-index ad32c32ff7cb..35a382138bf3 100644
---- a/src/vim9cmds.c
-+++ b/src/vim9cmds.c
-@@ -188,10 +188,17 @@ compile_lock_unlock(
- size_t len;
- char_u *buf;
- isntype_T isn = ISN_EXEC;
-+ char *cmd = eap->cmdidx == CMD_lockvar ? "lockvar" : "unlockvar";
-
- if (cctx->ctx_skip == SKIP_YES)
- return OK;
-
-+ if (*p == NUL)
-+ {
-+ semsg(_(e_argument_required_for_str), cmd);
-+ return FAIL;
-+ }
-+
- // Cannot use :lockvar and :unlockvar on local variables.
- if (p[1] != ':')
- {
-@@ -223,8 +230,6 @@ compile_lock_unlock(
- ret = FAIL;
- else
- {
-- char *cmd = eap->cmdidx == CMD_lockvar ? "lockvar" : "unlockvar";
--
- if (deep < 0)
- vim_snprintf((char *)buf, len, "%s! %s", cmd, p);
- else
diff --git a/patches/source/vim/CVE-2022-2889.patch b/patches/source/vim/CVE-2022-2889.patch
deleted file mode 100644
index a5153eaa2..000000000
--- a/patches/source/vim/CVE-2022-2889.patch
+++ /dev/null
@@ -1,236 +0,0 @@
-From 91c7cbfe31bbef57d5fcf7d76989fc159f73ef15 Mon Sep 17 00:00:00 2001
-From: Bram Moolenaar <Bram@vim.org>
-Date: Thu, 18 Aug 2022 13:28:31 +0100
-Subject: [PATCH] patch 9.0.0225: using freed memory with multiple line breaks
- in expression
-
-Problem: Using freed memory with multiple line breaks in expression.
-Solution: Free eval_tofree later.
-
-diff --git a/src/eval.c b/src/eval.c
-index 42b883e9b00b..60daca51ce9d 100644
---- a/src/eval.c
-+++ b/src/eval.c
-@@ -353,6 +353,63 @@ eval_to_string_skip(
- return retval;
- }
-
-+/*
-+ * Initialize "evalarg" for use.
-+ */
-+ void
-+init_evalarg(evalarg_T *evalarg)
-+{
-+ CLEAR_POINTER(evalarg);
-+ ga_init2(&evalarg->eval_tofree_ga, sizeof(char_u *), 20);
-+}
-+
-+/*
-+ * If "evalarg->eval_tofree" is not NULL free it later.
-+ * Caller is expected to overwrite "evalarg->eval_tofree" next.
-+ */
-+ static void
-+free_eval_tofree_later(evalarg_T *evalarg)
-+{
-+ if (evalarg->eval_tofree != NULL)
-+ {
-+ if (ga_grow(&evalarg->eval_tofree_ga, 1) == OK)
-+ ((char_u **)evalarg->eval_tofree_ga.ga_data)
-+ [evalarg->eval_tofree_ga.ga_len++]
-+ = evalarg->eval_tofree;
-+ else
-+ vim_free(evalarg->eval_tofree);
-+ }
-+}
-+
-+/*
-+ * After using "evalarg" filled from "eap": free the memory.
-+ */
-+ void
-+clear_evalarg(evalarg_T *evalarg, exarg_T *eap)
-+{
-+ if (evalarg != NULL)
-+ {
-+ if (evalarg->eval_tofree != NULL)
-+ {
-+ if (eap != NULL)
-+ {
-+ // We may need to keep the original command line, e.g. for
-+ // ":let" it has the variable names. But we may also need the
-+ // new one, "nextcmd" points into it. Keep both.
-+ vim_free(eap->cmdline_tofree);
-+ eap->cmdline_tofree = *eap->cmdlinep;
-+ *eap->cmdlinep = evalarg->eval_tofree;
-+ }
-+ else
-+ vim_free(evalarg->eval_tofree);
-+ evalarg->eval_tofree = NULL;
-+ }
-+
-+ ga_clear_strings(&evalarg->eval_tofree_ga);
-+ VIM_CLEAR(evalarg->eval_tofree_lambda);
-+ }
-+}
-+
- /*
- * Skip over an expression at "*pp".
- * Return FAIL for an error, OK otherwise.
-@@ -435,8 +492,8 @@ skip_expr_concatenate(
- // Do not free the first line, the caller can still use it.
- *((char_u **)gap->ga_data) = NULL;
- // Do not free the last line, "arg" points into it, free it
-- // later.
-- vim_free(evalarg->eval_tofree);
-+ // later. Also free "eval_tofree" later if needed.
-+ free_eval_tofree_later(evalarg);
- evalarg->eval_tofree =
- ((char_u **)gap->ga_data)[gap->ga_len - 1];
- ((char_u **)gap->ga_data)[gap->ga_len - 1] = NULL;
-@@ -2274,7 +2331,7 @@ eval_next_line(char_u *arg, evalarg_T *evalarg)
- }
- else if (evalarg->eval_cookie != NULL)
- {
-- vim_free(evalarg->eval_tofree);
-+ free_eval_tofree_later(evalarg);
- evalarg->eval_tofree = line;
- }
-
-@@ -2301,45 +2358,6 @@ skipwhite_and_linebreak(char_u *arg, evalarg_T *evalarg)
- return p;
- }
-
--/*
-- * Initialize "evalarg" for use.
-- */
-- void
--init_evalarg(evalarg_T *evalarg)
--{
-- CLEAR_POINTER(evalarg);
-- ga_init2(&evalarg->eval_tofree_ga, sizeof(char_u *), 20);
--}
--
--/*
-- * After using "evalarg" filled from "eap": free the memory.
-- */
-- void
--clear_evalarg(evalarg_T *evalarg, exarg_T *eap)
--{
-- if (evalarg != NULL)
-- {
-- if (evalarg->eval_tofree != NULL)
-- {
-- if (eap != NULL)
-- {
-- // We may need to keep the original command line, e.g. for
-- // ":let" it has the variable names. But we may also need the
-- // new one, "nextcmd" points into it. Keep both.
-- vim_free(eap->cmdline_tofree);
-- eap->cmdline_tofree = *eap->cmdlinep;
-- *eap->cmdlinep = evalarg->eval_tofree;
-- }
-- else
-- vim_free(evalarg->eval_tofree);
-- evalarg->eval_tofree = NULL;
-- }
--
-- ga_clear_strings(&evalarg->eval_tofree_ga);
-- VIM_CLEAR(evalarg->eval_tofree_lambda);
-- }
--}
--
- /*
- * The "evaluate" argument: When FALSE, the argument is only parsed but not
- * executed. The function may return OK, but the rettv will be of type
-diff --git a/src/proto/eval.pro b/src/proto/eval.pro
-index e6cd8928d19c..27a13c9498ba 100644
---- a/src/proto/eval.pro
-+++ b/src/proto/eval.pro
-@@ -9,6 +9,8 @@ int eval_expr_valid_arg(typval_T *tv);
- int eval_expr_typval(typval_T *expr, typval_T *argv, int argc, typval_T *rettv);
- int eval_expr_to_bool(typval_T *expr, int *error);
- char_u *eval_to_string_skip(char_u *arg, exarg_T *eap, int skip);
-+void init_evalarg(evalarg_T *evalarg);
-+void clear_evalarg(evalarg_T *evalarg, exarg_T *eap);
- int skip_expr(char_u **pp, evalarg_T *evalarg);
- int skip_expr_concatenate(char_u **arg, char_u **start, char_u **end, evalarg_T *evalarg);
- char_u *typval2string(typval_T *tv, int convert);
-@@ -34,8 +36,6 @@ int pattern_match(char_u *pat, char_u *text, int ic);
- char_u *eval_next_non_blank(char_u *arg, evalarg_T *evalarg, int *getnext);
- char_u *eval_next_line(char_u *arg, evalarg_T *evalarg);
- char_u *skipwhite_and_linebreak(char_u *arg, evalarg_T *evalarg);
--void init_evalarg(evalarg_T *evalarg);
--void clear_evalarg(evalarg_T *evalarg, exarg_T *eap);
- int eval0(char_u *arg, typval_T *rettv, exarg_T *eap, evalarg_T *evalarg);
- int eval0_retarg(char_u *arg, typval_T *rettv, exarg_T *eap, evalarg_T *evalarg, char_u **retarg);
- int eval1(char_u **arg, typval_T *rettv, evalarg_T *evalarg);
-diff --git a/src/testdir/test_vim9_script.vim b/src/testdir/test_vim9_script.vim
-index 56a39efcf79b..597e31ec1c26 100644
---- a/src/testdir/test_vim9_script.vim
-+++ b/src/testdir/test_vim9_script.vim
-@@ -1560,6 +1560,19 @@ def Test_func_redefine_fails()
- v9.CheckScriptFailure(lines, 'E1073:')
- enddef
-
-+def Test_lambda_split()
-+ # this was using freed memory, because of the split expression
-+ var lines =<< trim END
-+ vim9script
-+ try
-+ 0
-+ 0->(0
-+ ->a.0(
-+ ->u
-+ END
-+ v9.CheckScriptFailure(lines, 'E1050:')
-+enddef
-+
- def Test_fixed_size_list()
- # will be allocated as one piece of memory, check that changes work
- var l = [1, 2, 3, 4]
-diff --git a/src/userfunc.c b/src/userfunc.c
-index f612160fc872..e0bdc3fda911 100644
---- a/src/userfunc.c
-+++ b/src/userfunc.c
-@@ -1372,7 +1372,6 @@ get_lambda_tv(
- char_u *start, *end;
- int *old_eval_lavars = eval_lavars_used;
- int eval_lavars = FALSE;
-- char_u *tofree1 = NULL;
- char_u *tofree2 = NULL;
- int equal_arrow = **arg == '(';
- int white_error = FALSE;
-@@ -1457,12 +1456,6 @@ get_lambda_tv(
- ret = skip_expr_concatenate(arg, &start, &end, evalarg);
- if (ret == FAIL)
- goto errret;
-- if (evalarg != NULL)
-- {
-- // avoid that the expression gets freed when another line break follows
-- tofree1 = evalarg->eval_tofree;
-- evalarg->eval_tofree = NULL;
-- }
-
- if (!equal_arrow)
- {
-@@ -1585,10 +1578,6 @@ get_lambda_tv(
-
- theend:
- eval_lavars_used = old_eval_lavars;
-- if (evalarg != NULL && evalarg->eval_tofree == NULL)
-- evalarg->eval_tofree = tofree1;
-- else
-- vim_free(tofree1);
- vim_free(tofree2);
- if (types_optional)
- ga_clear_strings(&argtypes);
-@@ -1607,10 +1596,6 @@ get_lambda_tv(
- }
- vim_free(fp);
- vim_free(pt);
-- if (evalarg != NULL && evalarg->eval_tofree == NULL)
-- evalarg->eval_tofree = tofree1;
-- else
-- vim_free(tofree1);
- vim_free(tofree2);
- eval_lavars_used = old_eval_lavars;
- return FAIL;
diff --git a/patches/source/vim/vim-gvim.SlackBuild b/patches/source/vim/vim-gvim.SlackBuild
index 53f2686f3..a24a0ada1 100755
--- a/patches/source/vim/vim-gvim.SlackBuild
+++ b/patches/source/vim/vim-gvim.SlackBuild
@@ -30,9 +30,9 @@
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=vim-gvim
-VIMBRANCH=8.2
+VIMBRANCH=9.0
VERSION=$(echo vim-${VIMBRANCH}*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)
-BUILD=${BUILD:-3_slack15.0}
+BUILD=${BUILD:-1_slack15.0}
# The possible settings for this are yes/no/dynamic.
PERLINTERP=${PERLINTERP:-dynamic}
@@ -111,12 +111,6 @@ find . \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
-# Fix security issues:
-zcat $CWD/CVE-2022-2816.patch.gz | patch -p1 --verbose || exit 1
-zcat $CWD/CVE-2022-2817.patch.gz | patch -p1 --verbose || exit 1
-zcat $CWD/CVE-2022-2819.patch.gz | patch -p1 --verbose || exit 1
-zcat $CWD/CVE-2022-2889.patch.gz | patch -p1 --verbose || exit 1
-
config_vim --with-x --enable-gui=gtk3 || exit 1
make $NUMJOBS || make || exit 1
make install DESTDIR=$PKG || exit 1
diff --git a/patches/source/vim/vim.SlackBuild b/patches/source/vim/vim.SlackBuild
index b628315ce..2d2cbe5b3 100755
--- a/patches/source/vim/vim.SlackBuild
+++ b/patches/source/vim/vim.SlackBuild
@@ -23,9 +23,9 @@
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=vim
-VIMBRANCH=8.2
+VIMBRANCH=9.0
CTAGSVER=5.8
-BUILD=${BUILD:-3_slack15.0}
+BUILD=${BUILD:-1_slack15.0}
# The possible settings for this are yes/no/dynamic.
PERLINTERP=${PERLINTERP:-dynamic}
@@ -152,12 +152,6 @@ find . \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
-# Fix security issues:
-zcat $CWD/CVE-2022-2816.patch.gz | patch -p1 --verbose || exit 1
-zcat $CWD/CVE-2022-2817.patch.gz | patch -p1 --verbose || exit 1
-zcat $CWD/CVE-2022-2819.patch.gz | patch -p1 --verbose || exit 1
-zcat $CWD/CVE-2022-2889.patch.gz | patch -p1 --verbose || exit 1
-
config_vim --without-x --disable-gui || exit 1
make $NUMJOBS || make || exit 1
make install DESTDIR=$PKG || exit 1
diff --git a/recompress.sh b/recompress.sh
index 02aaabdb9..68ef7707a 100755
--- a/recompress.sh
+++ b/recompress.sh
@@ -1181,12 +1181,8 @@ gzip ./patches/source/python3/python3.distutils.x86_64.diff
gzip ./patches/source/seamonkey/autoconf/autoconf-2.13-consolidated_fixes-1.patch
gzip ./patches/source/seamonkey/doinst.sh
gzip ./patches/source/seamonkey/sm.ui.scrollToClick.diff
-gzip ./patches/source/vim/CVE-2022-2889.patch
-gzip ./patches/source/vim/CVE-2022-2819.patch
gzip ./patches/source/vim/ctags.use-conventional-unused-marker.patch
gzip ./patches/source/vim/vim.vimrc.diff
-gzip ./patches/source/vim/CVE-2022-2817.patch
-gzip ./patches/source/vim/CVE-2022-2816.patch
gzip ./patches/source/libxslt/libxslt.xsltMaxDepth.diff
gzip ./patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch
gzip ./patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch