From 71a81b740897cf4e38ea73171f3d0aeb05c848e5 Mon Sep 17 00:00:00 2001 From: Patrick J Volkerding Date: Fri, 26 Aug 2022 04:02:20 +0000 Subject: Fri Aug 26 04:02:20 UTC 2022 patches/packages/linux-5.15.63/*: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 5.15.39: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734 Fixed in 5.15.40: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943 Fixed in 5.15.41: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012 Fixed in 5.15.42: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499 Fixed in 5.15.44: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789 Fixed in 5.15.45: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503 Fixed in 5.15.46: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1973 Fixed in 5.15.47: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34495 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32981 Fixed in 5.15.48: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123 Fixed in 5.15.53: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744 Fixed in 5.15.54: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918 Fixed in 5.15.56: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123 Fixed in 5.15.57: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901 Fixed in 5.15.58: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879 Fixed in 5.15.59: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946 Fixed in 5.15.60: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373 Fixed in 5.15.61: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 (* Security fix *) patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded. We're just going to move to vim-9 instead of continuing to backport patches to the vim-8 branch. Most users will be better served by this. Fixed use after free and null pointer dereference. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923 (* Security fix *) patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded. --- ChangeLog.rss | 99 ++++++++- ChangeLog.txt | 87 +++++++- FILELIST.TXT | 102 +++++---- .../kernel-generic-5.15.38-x86_64-1.txt | 11 - .../linux-5.15.38/kernel-headers-5.15.38-x86-1.txt | 11 - .../linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt | 11 - .../kernel-modules-5.15.38-x86_64-1.txt | 11 - .../kernel-source-5.15.38-noarch-1.txt | 11 - .../kernel-generic-5.15.63-x86_64-1.txt | 11 + .../linux-5.15.63/kernel-headers-5.15.63-x86-1.txt | 11 + .../linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt | 11 + .../kernel-modules-5.15.63-x86_64-1.txt | 11 + .../kernel-source-5.15.63-noarch-1.txt | 11 + .../packages/vim-8.2.4649-x86_64-3_slack15.0.txt | 11 - .../packages/vim-9.0.0270-x86_64-1_slack15.0.txt | 11 + .../vim-gvim-8.2.4649-x86_64-3_slack15.0.txt | 11 - .../vim-gvim-9.0.0270-x86_64-1_slack15.0.txt | 11 + patches/source/vim/CVE-2022-2816.patch | 26 --- patches/source/vim/CVE-2022-2817.patch | 69 ------ patches/source/vim/CVE-2022-2819.patch | 40 ---- patches/source/vim/CVE-2022-2889.patch | 236 --------------------- patches/source/vim/vim-gvim.SlackBuild | 10 +- patches/source/vim/vim.SlackBuild | 10 +- recompress.sh | 4 - 24 files changed, 312 insertions(+), 525 deletions(-) delete mode 100644 patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt delete mode 100644 patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt delete mode 100644 patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt delete mode 100644 patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt delete mode 100644 patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt create mode 100644 patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt create mode 100644 patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt create mode 100644 patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt create mode 100644 patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt create mode 100644 patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt delete mode 100644 patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt create mode 100644 patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt delete mode 100644 patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt create mode 100644 patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt delete mode 100644 patches/source/vim/CVE-2022-2816.patch delete mode 100644 patches/source/vim/CVE-2022-2817.patch delete mode 100644 patches/source/vim/CVE-2022-2819.patch delete mode 100644 patches/source/vim/CVE-2022-2889.patch diff --git a/ChangeLog.rss b/ChangeLog.rss index b52ce43a7..cba63e613 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,9 +11,102 @@ Tracking Slackware development in git. en-us urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f - Tue, 23 Aug 2022 19:27:56 GMT - Wed, 24 Aug 2022 11:30:15 GMT + Fri, 26 Aug 2022 04:02:20 GMT + Sat, 27 Aug 2022 11:30:15 GMT maintain_current_git.sh v 1.17 + + Fri, 26 Aug 2022 04:02:20 GMT + Fri, 26 Aug 2022 04:02:20 GMT + https://git.slackware.nl/current/tag/?h=20220826040220 + 20220826040220 + + +patches/packages/linux-5.15.63/*: Upgraded. + These updates fix various bugs and security issues. + Be sure to upgrade your initrd after upgrading the kernel packages. + If you use lilo to boot your machine, be sure lilo.conf points to the correct + kernel and initrd and run lilo as root to update the bootloader. + If you use elilo to boot your machine, you should run eliloconfig to copy the + kernel and initrd to the EFI System Partition. + For more information, see: + Fixed in 5.15.39: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734 + Fixed in 5.15.40: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943 + Fixed in 5.15.41: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012 + Fixed in 5.15.42: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499 + Fixed in 5.15.44: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789 + Fixed in 5.15.45: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503 + Fixed in 5.15.46: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1973 + Fixed in 5.15.47: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34495 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32981 + Fixed in 5.15.48: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123 + Fixed in 5.15.53: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744 + Fixed in 5.15.54: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918 + Fixed in 5.15.56: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123 + Fixed in 5.15.57: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901 + Fixed in 5.15.58: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879 + Fixed in 5.15.59: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946 + Fixed in 5.15.60: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373 + Fixed in 5.15.61: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 + (* Security fix *) +patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded. + We're just going to move to vim-9 instead of continuing to backport patches + to the vim-8 branch. Most users will be better served by this. + Fixed use after free and null pointer dereference. + Thanks to marav for the heads-up. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923 + (* Security fix *) +patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded. + ]]> + + Tue, 23 Aug 2022 19:27:56 GMT Tue, 23 Aug 2022 19:27:56 GMT @@ -23,7 +116,7 @@ extra/sendmail/sendmail-8.17.1-x86_64-3_slack15.0.txz: Rebuilt. In recent versions of glibc, USE_INET6 has been removed which caused sendmail - to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNNAME2=1 to the + to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNAME2=1 to the site.config.m4 allows the reverse lookups to work again fixing this issue. Thanks to talo. extra/sendmail/sendmail-cf-8.17.1-noarch-3_slack15.0.txz: Rebuilt. diff --git a/ChangeLog.txt b/ChangeLog.txt index dfb1e7121..e2bfaba29 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,7 +1,92 @@ +Fri Aug 26 04:02:20 UTC 2022 +patches/packages/linux-5.15.63/*: Upgraded. + These updates fix various bugs and security issues. + Be sure to upgrade your initrd after upgrading the kernel packages. + If you use lilo to boot your machine, be sure lilo.conf points to the correct + kernel and initrd and run lilo as root to update the bootloader. + If you use elilo to boot your machine, you should run eliloconfig to copy the + kernel and initrd to the EFI System Partition. + For more information, see: + Fixed in 5.15.39: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734 + Fixed in 5.15.40: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943 + Fixed in 5.15.41: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012 + Fixed in 5.15.42: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499 + Fixed in 5.15.44: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789 + Fixed in 5.15.45: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503 + Fixed in 5.15.46: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1973 + Fixed in 5.15.47: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34495 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32981 + Fixed in 5.15.48: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123 + Fixed in 5.15.53: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744 + Fixed in 5.15.54: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918 + Fixed in 5.15.56: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123 + Fixed in 5.15.57: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901 + Fixed in 5.15.58: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879 + Fixed in 5.15.59: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946 + Fixed in 5.15.60: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373 + Fixed in 5.15.61: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588 + (* Security fix *) +patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded. + We're just going to move to vim-9 instead of continuing to backport patches + to the vim-8 branch. Most users will be better served by this. + Fixed use after free and null pointer dereference. + Thanks to marav for the heads-up. + For more information, see: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923 + (* Security fix *) +patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz: Upgraded. ++--------------------------+ Tue Aug 23 19:27:56 UTC 2022 extra/sendmail/sendmail-8.17.1-x86_64-3_slack15.0.txz: Rebuilt. In recent versions of glibc, USE_INET6 has been removed which caused sendmail - to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNNAME2=1 to the + to reject mail from IPv6 addresses. Adding -DHAS_GETHOSTBYNAME2=1 to the site.config.m4 allows the reverse lookups to work again fixing this issue. Thanks to talo. extra/sendmail/sendmail-cf-8.17.1-noarch-3_slack15.0.txz: Rebuilt. diff --git a/FILELIST.TXT b/FILELIST.TXT index 3efda7a58..123a094c4 100644 --- a/FILELIST.TXT +++ b/FILELIST.TXT @@ -1,20 +1,20 @@ -Tue Aug 23 19:31:52 UTC 2022 +Fri Aug 26 04:06:22 UTC 2022 Here is the file list for this directory. If you are using a mirror site and find missing or extra files in the disk subdirectories, please have the archive administrator refresh the mirror. -drwxr-xr-x 12 root root 4096 2022-08-23 19:27 . +drwxr-xr-x 12 root root 4096 2022-08-26 04:02 . -rw-r--r-- 1 root root 5767 2022-02-02 22:44 ./ANNOUNCE.15.0 -rw-r--r-- 1 root root 16609 2022-03-30 19:03 ./CHANGES_AND_HINTS.TXT --rw-r--r-- 1 root root 1147805 2022-08-20 20:06 ./CHECKSUMS.md5 --rw-r--r-- 1 root root 163 2022-08-20 20:06 ./CHECKSUMS.md5.asc +-rw-r--r-- 1 root root 1148446 2022-08-23 19:32 ./CHECKSUMS.md5 +-rw-r--r-- 1 root root 163 2022-08-23 19:32 ./CHECKSUMS.md5.asc -rw-r--r-- 1 root root 17976 1994-06-10 02:28 ./COPYING -rw-r--r-- 1 root root 35147 2007-06-30 04:21 ./COPYING3 -rw-r--r-- 1 root root 19573 2016-06-23 20:08 ./COPYRIGHT.TXT -rw-r--r-- 1 root root 616 2006-10-02 04:37 ./CRYPTO_NOTICE.TXT --rw-r--r-- 1 root root 1919299 2022-08-23 19:27 ./ChangeLog.txt +-rw-r--r-- 1 root root 1923852 2022-08-26 04:02 ./ChangeLog.txt drwxr-xr-x 3 root root 4096 2013-03-20 22:17 ./EFI drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT -rw-r--r-- 1 root root 1187840 2021-06-15 19:16 ./EFI/BOOT/bootx64.efi @@ -25,7 +25,7 @@ drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT -rwxr-xr-x 1 root root 2504 2019-07-05 18:54 ./EFI/BOOT/make-grub.sh -rw-r--r-- 1 root root 10722 2013-09-21 19:02 ./EFI/BOOT/osdetect.cfg -rw-r--r-- 1 root root 1273 2013-08-12 21:08 ./EFI/BOOT/tools.cfg --rw-r--r-- 1 root root 1498444 2022-08-20 20:06 ./FILELIST.TXT +-rw-r--r-- 1 root root 1499279 2022-08-23 19:31 ./FILELIST.TXT -rw-r--r-- 1 root root 1572 2012-08-29 18:27 ./GPG-KEY -rw-r--r-- 1 root root 864745 2022-02-02 08:25 ./PACKAGES.TXT -rw-r--r-- 1 root root 8034 2022-02-02 03:36 ./README.TXT @@ -737,13 +737,13 @@ drwxr-xr-x 2 root root 4096 2008-05-07 05:21 ./pasture/source/php/pear -rwxr-xr-x 1 root root 9448 2018-05-16 22:38 ./pasture/source/php/php.SlackBuild -rw-r--r-- 1 root root 775 2017-07-07 19:25 ./pasture/source/php/php.ini-development.diff.gz -rw-r--r-- 1 root root 830 2005-12-09 05:18 ./pasture/source/php/slack-desc -drwxr-xr-x 4 root root 4096 2022-08-23 19:31 ./patches --rw-r--r-- 1 root root 44742 2022-08-23 19:31 ./patches/CHECKSUMS.md5 --rw-r--r-- 1 root root 163 2022-08-23 19:31 ./patches/CHECKSUMS.md5.asc --rw-r--r-- 1 root root 59993 2022-08-23 19:31 ./patches/FILE_LIST --rw-r--r-- 1 root root 11256639 2022-08-23 19:31 ./patches/MANIFEST.bz2 --rw-r--r-- 1 root root 34149 2022-08-23 19:31 ./patches/PACKAGES.TXT -drwxr-xr-x 3 root root 16384 2022-08-23 19:31 ./patches/packages +drwxr-xr-x 4 root root 4096 2022-08-26 04:06 ./patches +-rw-r--r-- 1 root root 44462 2022-08-26 04:06 ./patches/CHECKSUMS.md5 +-rw-r--r-- 1 root root 163 2022-08-26 04:06 ./patches/CHECKSUMS.md5.asc +-rw-r--r-- 1 root root 59645 2022-08-26 04:06 ./patches/FILE_LIST +-rw-r--r-- 1 root root 11248002 2022-08-26 04:06 ./patches/MANIFEST.bz2 +-rw-r--r-- 1 root root 34149 2022-08-26 04:06 ./patches/PACKAGES.TXT +drwxr-xr-x 3 root root 16384 2022-08-26 04:05 ./patches/packages -rw-r--r-- 1 root root 327 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txt -rw-r--r-- 1 root root 10716 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz -rw-r--r-- 1 root root 163 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz.asc @@ -810,22 +810,22 @@ drwxr-xr-x 3 root root 16384 2022-08-23 19:31 ./patches/packages -rw-r--r-- 1 root root 219 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txt -rw-r--r-- 1 root root 375568 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz -rw-r--r-- 1 root root 163 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz.asc -drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15.38 --rw-r--r-- 1 root root 624 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt --rw-r--r-- 1 root root 8218112 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz.asc --rw-r--r-- 1 root root 332 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt --rw-r--r-- 1 root root 1078936 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz --rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz.asc --rw-r--r-- 1 root root 636 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt --rw-r--r-- 1 root root 12157884 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz.asc --rw-r--r-- 1 root root 567 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt --rw-r--r-- 1 root root 50239932 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz.asc --rw-r--r-- 1 root root 317 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt --rw-r--r-- 1 root root 123035916 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz --rw-r--r-- 1 root root 163 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz.asc +drwxr-xr-x 2 root root 4096 2022-08-26 04:06 ./patches/packages/linux-5.15.63 +-rw-r--r-- 1 root root 624 2022-08-26 01:49 ./patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt +-rw-r--r-- 1 root root 8467508 2022-08-26 01:49 ./patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-08-26 01:49 ./patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txz.asc +-rw-r--r-- 1 root root 332 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt +-rw-r--r-- 1 root root 1079428 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txz +-rw-r--r-- 1 root root 163 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txz.asc +-rw-r--r-- 1 root root 636 2022-08-26 01:46 ./patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt +-rw-r--r-- 1 root root 12504496 2022-08-26 01:46 ./patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-08-26 01:46 ./patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txz.asc +-rw-r--r-- 1 root root 567 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt +-rw-r--r-- 1 root root 51351084 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-08-26 02:10 ./patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txz.asc +-rw-r--r-- 1 root root 317 2022-08-26 01:41 ./patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt +-rw-r--r-- 1 root root 123142872 2022-08-26 01:41 ./patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txz +-rw-r--r-- 1 root root 163 2022-08-26 01:41 ./patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txz.asc -rw-r--r-- 1 root root 369 2022-08-16 18:26 ./patches/packages/mariadb-10.5.17-x86_64-1_slack15.0.txt -rw-r--r-- 1 root root 29383552 2022-08-16 18:26 ./patches/packages/mariadb-10.5.17-x86_64-1_slack15.0.txz -rw-r--r-- 1 root root 163 2022-08-16 18:26 ./patches/packages/mariadb-10.5.17-x86_64-1_slack15.0.txz.asc @@ -877,12 +877,12 @@ drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15 -rw-r--r-- 1 root root 354 2022-02-15 18:37 ./patches/packages/util-linux-2.37.4-x86_64-1_slack15.0.txt -rw-r--r-- 1 root root 2805300 2022-02-15 18:37 ./patches/packages/util-linux-2.37.4-x86_64-1_slack15.0.txz -rw-r--r-- 1 root root 163 2022-02-15 18:37 ./patches/packages/util-linux-2.37.4-x86_64-1_slack15.0.txz.asc --rw-r--r-- 1 root root 383 2022-08-20 18:51 ./patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt --rw-r--r-- 1 root root 8141876 2022-08-20 18:51 ./patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txz --rw-r--r-- 1 root root 163 2022-08-20 18:51 ./patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txz.asc --rw-r--r-- 1 root root 503 2022-08-20 18:52 ./patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt --rw-r--r-- 1 root root 1659760 2022-08-20 18:52 ./patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txz --rw-r--r-- 1 root root 163 2022-08-20 18:52 ./patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txz.asc +-rw-r--r-- 1 root root 383 2022-08-26 03:34 ./patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt +-rw-r--r-- 1 root root 8408256 2022-08-26 03:34 ./patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz +-rw-r--r-- 1 root root 163 2022-08-26 03:34 ./patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz.asc +-rw-r--r-- 1 root root 503 2022-08-26 03:35 ./patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt +-rw-r--r-- 1 root root 1682320 2022-08-26 03:35 ./patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz +-rw-r--r-- 1 root root 163 2022-08-26 03:35 ./patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz.asc -rw-r--r-- 1 root root 507 2022-07-10 18:40 ./patches/packages/wavpack-5.5.0-x86_64-1_slack15.0.txt -rw-r--r-- 1 root root 185936 2022-07-10 18:40 ./patches/packages/wavpack-5.5.0-x86_64-1_slack15.0.txz -rw-r--r-- 1 root root 163 2022-07-10 18:40 ./patches/packages/wavpack-5.5.0-x86_64-1_slack15.0.txz.asc @@ -907,7 +907,7 @@ drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15 -rw-r--r-- 1 root root 388 2022-08-09 17:48 ./patches/packages/zlib-1.2.12-x86_64-2_slack15.0.txt -rw-r--r-- 1 root root 105196 2022-08-09 17:48 ./patches/packages/zlib-1.2.12-x86_64-2_slack15.0.txz -rw-r--r-- 1 root root 163 2022-08-09 17:48 ./patches/packages/zlib-1.2.12-x86_64-2_slack15.0.txz.asc -drwxr-xr-x 46 root root 4096 2022-08-23 19:23 ./patches/source +drwxr-xr-x 46 root root 4096 2022-08-26 03:43 ./patches/source drwxr-xr-x 2 root root 4096 2022-01-16 05:07 ./patches/source/aaa_base -rw-r--r-- 1 root root 11041 2022-02-15 04:49 ./patches/source/aaa_base/_aaa_base.tar.gz -rwxr-xr-x 1 root root 3894 2022-02-15 05:07 ./patches/source/aaa_base/aaa_base.SlackBuild @@ -1308,19 +1308,15 @@ drwxr-xr-x 2 root root 4096 2020-05-08 19:39 ./patches/source/util-linux/p -rw-r--r-- 1 root root 335 2014-07-03 08:34 ./patches/source/util-linux/util-linux.fdisk-no-solaris.diff.gz -rw-r--r-- 1 root root 10292 2009-05-30 01:25 ./patches/source/util-linux/ziptool-1.4.0.tar.xz -rw-r--r-- 1 root root 386 2009-05-30 01:25 ./patches/source/util-linux/ziptool-fix_build.patch.gz -drwxr-xr-x 2 root root 4096 2022-08-20 18:50 ./patches/source/vim --rw-r--r-- 1 root root 547 2022-08-17 19:02 ./patches/source/vim/CVE-2022-2816.patch.gz --rw-r--r-- 1 root root 1105 2022-08-17 19:03 ./patches/source/vim/CVE-2022-2817.patch.gz --rw-r--r-- 1 root root 687 2022-08-17 19:03 ./patches/source/vim/CVE-2022-2819.patch.gz --rw-r--r-- 1 root root 2343 2022-08-20 18:50 ./patches/source/vim/CVE-2022-2889.patch.gz +drwxr-xr-x 2 root root 4096 2022-08-26 03:29 ./patches/source/vim -rw-r--r-- 1 root root 299348 2009-07-09 22:03 ./patches/source/vim/ctags-5.8.tar.xz -rw-r--r-- 1 root root 2768 2022-02-12 08:11 ./patches/source/vim/ctags.use-conventional-unused-marker.patch.gz -rw-r--r-- 1 root root 8249 2006-01-19 17:01 ./patches/source/vim/gvim.png -rw-r--r-- 1 root root 834 2018-02-27 06:13 ./patches/source/vim/slack-desc.vim -rw-r--r-- 1 root root 959 2018-03-15 02:41 ./patches/source/vim/slack-desc.vim-gvim --rw-r--r-- 1 root root 10400559 2022-03-30 18:17 ./patches/source/vim/vim-8.2.4649.tar.lz --rwxr-xr-x 1 root root 6654 2022-08-20 18:44 ./patches/source/vim/vim-gvim.SlackBuild --rwxr-xr-x 1 root root 8218 2022-08-20 18:44 ./patches/source/vim/vim.SlackBuild +-rw-r--r-- 1 root root 10692405 2022-08-26 02:43 ./patches/source/vim/vim-9.0.0270.tar.lz +-rwxr-xr-x 1 root root 6370 2022-08-24 18:49 ./patches/source/vim/vim-gvim.SlackBuild +-rwxr-xr-x 1 root root 7934 2022-08-24 18:49 ./patches/source/vim/vim.SlackBuild -rw-r--r-- 1 root root 283 2019-01-11 20:43 ./patches/source/vim/vim.vimrc.diff.gz drwxr-xr-x 2 root root 4096 2022-07-10 18:34 ./patches/source/wavpack -rw-r--r-- 1 root root 963 2019-12-19 18:54 ./patches/source/wavpack/slack-desc @@ -2739,9 +2735,9 @@ drwxr-xr-x 2 root root 69632 2022-02-01 08:29 ./slackware64/kde -rw-r--r-- 1 root root 163 2022-01-06 22:29 ./slackware64/kde/kigo-21.12.1-x86_64-1.txz.asc -rw-r--r-- 1 root root 216 2021-12-26 20:10 ./slackware64/kde/kile-2.9.93-x86_64-15.txt -rw-r--r-- 1 root root 7406860 2021-12-26 20:10 ./slackware64/kde/kile-2.9.93-x86_64-15.txz --rw-r--r-- 1 root root 163 2021-12-26 20:10 ./slackware64/kde/kile-2.9.93-x86_64-15.txz.asc --rw-r--r-- 1 root root 198 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txt --rw-r--r-- 1 root root 1347260 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txz +-rw-r--r-- 1 root root 163 2021-12-26 20:10 ./slackware64/kde/kile-2.9.93-x86_64-15.txz.asc +-rw-r--r-- 1 root root 198 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txt +-rw-r--r-- 1 root root 1347260 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txz -rw-r--r-- 1 root root 163 2022-01-06 22:31 ./slackware64/kde/killbots-21.12.1-x86_64-1.txz.asc -rw-r--r-- 1 root root 429 2022-01-08 22:35 ./slackware64/kde/kimageformats-5.90.0-x86_64-1.txt -rw-r--r-- 1 root root 118812 2022-01-08 22:35 ./slackware64/kde/kimageformats-5.90.0-x86_64-1.txz @@ -5494,9 +5490,9 @@ drwxr-xr-x 2 root root 65536 2022-02-01 04:47 ./slackware64/x -rw-r--r-- 1 root root 2551752 2021-02-13 12:59 ./slackware64/x/motif-2.3.8-x86_64-5.txz -rw-r--r-- 1 root root 163 2021-02-13 12:59 ./slackware64/x/motif-2.3.8-x86_64-5.txz.asc -rw-r--r-- 1 root root 583 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txt --rw-r--r-- 1 root root 22116 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txz --rw-r--r-- 1 root root 163 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txz.asc --rw-r--r-- 1 root root 340 2021-02-13 12:59 ./slackware64/x/mypaint-brushes-1.3.0-noarch-3.txt +-rw-r--r-- 1 root root 22116 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txz +-rw-r--r-- 1 root root 163 2021-02-13 12:59 ./slackware64/x/mtdev-1.1.6-x86_64-3.txz.asc +-rw-r--r-- 1 root root 340 2021-02-13 12:59 ./slackware64/x/mypaint-brushes-1.3.0-noarch-3.txt -rw-r--r-- 1 root root 2346676 2021-02-13 12:59 ./slackware64/x/mypaint-brushes-1.3.0-noarch-3.txz -rw-r--r-- 1 root root 163 2021-02-13 12:59 ./slackware64/x/mypaint-brushes-1.3.0-noarch-3.txz.asc -rw-r--r-- 1 root root 803 2021-02-13 13:00 ./slackware64/x/noto-cjk-fonts-ttf-2.001-noarch-3.txt @@ -15108,9 +15104,9 @@ drwxr-xr-x 2 root root 4096 2021-12-10 20:40 ./source/x/x11/src/lib -rw-r--r-- 1 root root 439404 2020-02-22 20:51 ./source/x/x11/src/lib/libxcb-1.14.tar.xz -rw-r--r-- 1 root root 302836 2019-03-16 18:36 ./source/x/x11/src/lib/libxkbfile-1.1.0.tar.xz -rw-r--r-- 1 root root 250612 2018-02-26 17:27 ./source/x/x11/src/lib/libxshmfence-1.3.tar.xz --rw-r--r-- 1 root root 634752 2020-04-19 21:56 ./source/x/x11/src/lib/pixman-0.40.0.tar.xz --rw-r--r-- 1 root root 169464 2019-03-16 21:30 ./source/x/x11/src/lib/xtrans-1.4.0.tar.xz -drwxr-xr-x 2 root root 4096 2021-09-20 18:27 ./source/x/x11/src/proto +-rw-r--r-- 1 root root 634752 2020-04-19 21:56 ./source/x/x11/src/lib/pixman-0.40.0.tar.xz +-rw-r--r-- 1 root root 169464 2019-03-16 21:30 ./source/x/x11/src/lib/xtrans-1.4.0.tar.xz +drwxr-xr-x 2 root root 4096 2021-09-20 18:27 ./source/x/x11/src/proto -rw-r--r-- 1 root root 143588 2020-10-08 22:32 ./source/x/x11/src/proto/xcb-proto-1.14.1.tar.xz -rw-r--r-- 1 root root 763248 2021-09-15 15:59 ./source/x/x11/src/proto/xorgproto-2021.5.tar.xz drwxr-xr-x 2 root root 4096 2021-08-02 18:03 ./source/x/x11/src/util diff --git a/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt deleted file mode 100644 index 975a5ba6d..000000000 --- a/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt +++ /dev/null @@ -1,11 +0,0 @@ -kernel-generic: kernel-generic (a general purpose SMP Linux kernel) -kernel-generic: -kernel-generic: This is a Linux kernel with built-in support for most disk -kernel-generic: controllers. To use filesystems, or to load support for a SCSI or -kernel-generic: other controller, then you'll need to load one or more kernel -kernel-generic: modules using an initial ramdisk, or initrd. For more information -kernel-generic: about creating an initrd, see the README.initrd file in the /boot -kernel-generic: directory. -kernel-generic: -kernel-generic: SMP is "Symmetric multiprocessing", or multiple CPU/core support. -kernel-generic: diff --git a/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt b/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt deleted file mode 100644 index 27b46a0e6..000000000 --- a/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt +++ /dev/null @@ -1,11 +0,0 @@ -kernel-headers: kernel-headers (Linux kernel include files) -kernel-headers: -kernel-headers: These are the include files from the Linux kernel. -kernel-headers: -kernel-headers: You'll need these to compile most system software for Linux. -kernel-headers: -kernel-headers: -kernel-headers: -kernel-headers: -kernel-headers: -kernel-headers: diff --git a/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt deleted file mode 100644 index 2d6170611..000000000 --- a/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt +++ /dev/null @@ -1,11 +0,0 @@ -kernel-huge: kernel-huge (a fully-loaded SMP Linux kernel) -kernel-huge: -kernel-huge: This is a Linux kernel with built-in support for most disk -kernel-huge: controllers. If you're looking for a more stripped down kernel -kernel-huge: (this one contains everything but the kitchen sink ;-), then install -kernel-huge: the kernel-generic in the /boot directory along with an initrd to -kernel-huge: load support for your boot device and filesystem. For instructions -kernel-huge: on the initrd, see README.initrd in the /boot directory. -kernel-huge: -kernel-huge: SMP is "Symmetric multiprocessing", or multiple CPU/core support. -kernel-huge: diff --git a/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt deleted file mode 100644 index 9a9441043..000000000 --- a/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt +++ /dev/null @@ -1,11 +0,0 @@ -kernel-modules: kernel-modules (Linux kernel modules) -kernel-modules: -kernel-modules: Kernel modules are pieces of code that can be loaded and unloaded into -kernel-modules: the kernel upon demand. They extend the functionality of the kernel -kernel-modules: without the need to reboot the system. These modules provide support -kernel-modules: for hardware such as USB devices, RAID controllers, network -kernel-modules: interfaces, and display devices, or add other additional capabilities -kernel-modules: to the kernel. -kernel-modules: -kernel-modules: -kernel-modules: diff --git a/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt b/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt deleted file mode 100644 index eb2b0a30c..000000000 --- a/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt +++ /dev/null @@ -1,11 +0,0 @@ -kernel-source: kernel-source (Linux kernel source) -kernel-source: -kernel-source: Source code for Linus Torvalds' Linux kernel. -kernel-source: -kernel-source: This is the complete and unmodified source code for the Linux kernel. -kernel-source: -kernel-source: -kernel-source: -kernel-source: -kernel-source: -kernel-source: diff --git a/patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt b/patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt new file mode 100644 index 000000000..975a5ba6d --- /dev/null +++ b/patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txt @@ -0,0 +1,11 @@ +kernel-generic: kernel-generic (a general purpose SMP Linux kernel) +kernel-generic: +kernel-generic: This is a Linux kernel with built-in support for most disk +kernel-generic: controllers. To use filesystems, or to load support for a SCSI or +kernel-generic: other controller, then you'll need to load one or more kernel +kernel-generic: modules using an initial ramdisk, or initrd. For more information +kernel-generic: about creating an initrd, see the README.initrd file in the /boot +kernel-generic: directory. +kernel-generic: +kernel-generic: SMP is "Symmetric multiprocessing", or multiple CPU/core support. +kernel-generic: diff --git a/patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt b/patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt new file mode 100644 index 000000000..27b46a0e6 --- /dev/null +++ b/patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txt @@ -0,0 +1,11 @@ +kernel-headers: kernel-headers (Linux kernel include files) +kernel-headers: +kernel-headers: These are the include files from the Linux kernel. +kernel-headers: +kernel-headers: You'll need these to compile most system software for Linux. +kernel-headers: +kernel-headers: +kernel-headers: +kernel-headers: +kernel-headers: +kernel-headers: diff --git a/patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt b/patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt new file mode 100644 index 000000000..2d6170611 --- /dev/null +++ b/patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txt @@ -0,0 +1,11 @@ +kernel-huge: kernel-huge (a fully-loaded SMP Linux kernel) +kernel-huge: +kernel-huge: This is a Linux kernel with built-in support for most disk +kernel-huge: controllers. If you're looking for a more stripped down kernel +kernel-huge: (this one contains everything but the kitchen sink ;-), then install +kernel-huge: the kernel-generic in the /boot directory along with an initrd to +kernel-huge: load support for your boot device and filesystem. For instructions +kernel-huge: on the initrd, see README.initrd in the /boot directory. +kernel-huge: +kernel-huge: SMP is "Symmetric multiprocessing", or multiple CPU/core support. +kernel-huge: diff --git a/patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt b/patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt new file mode 100644 index 000000000..9a9441043 --- /dev/null +++ b/patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txt @@ -0,0 +1,11 @@ +kernel-modules: kernel-modules (Linux kernel modules) +kernel-modules: +kernel-modules: Kernel modules are pieces of code that can be loaded and unloaded into +kernel-modules: the kernel upon demand. They extend the functionality of the kernel +kernel-modules: without the need to reboot the system. These modules provide support +kernel-modules: for hardware such as USB devices, RAID controllers, network +kernel-modules: interfaces, and display devices, or add other additional capabilities +kernel-modules: to the kernel. +kernel-modules: +kernel-modules: +kernel-modules: diff --git a/patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt b/patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt new file mode 100644 index 000000000..eb2b0a30c --- /dev/null +++ b/patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txt @@ -0,0 +1,11 @@ +kernel-source: kernel-source (Linux kernel source) +kernel-source: +kernel-source: Source code for Linus Torvalds' Linux kernel. +kernel-source: +kernel-source: This is the complete and unmodified source code for the Linux kernel. +kernel-source: +kernel-source: +kernel-source: +kernel-source: +kernel-source: +kernel-source: diff --git a/patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt b/patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt deleted file mode 100644 index 4a843388d..000000000 --- a/patches/packages/vim-8.2.4649-x86_64-3_slack15.0.txt +++ /dev/null @@ -1,11 +0,0 @@ -vim: vim (Vi IMproved) -vim: -vim: Vim is an almost compatible version of the UNIX editor vi. Many new -vim: features have been added: multi level undo, command line history, -vim: filename completion, block operations, and more. -vim: -vim: Vim's development is led by Bram Moolenaar. -vim: -vim: This package also contains the Exuberant Ctags program -vim: written by Darren Hiebert. -vim: diff --git a/patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt b/patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt new file mode 100644 index 000000000..4a843388d --- /dev/null +++ b/patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txt @@ -0,0 +1,11 @@ +vim: vim (Vi IMproved) +vim: +vim: Vim is an almost compatible version of the UNIX editor vi. Many new +vim: features have been added: multi level undo, command line history, +vim: filename completion, block operations, and more. +vim: +vim: Vim's development is led by Bram Moolenaar. +vim: +vim: This package also contains the Exuberant Ctags program +vim: written by Darren Hiebert. +vim: diff --git a/patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt b/patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt deleted file mode 100644 index 3b81553b1..000000000 --- a/patches/packages/vim-gvim-8.2.4649-x86_64-3_slack15.0.txt +++ /dev/null @@ -1,11 +0,0 @@ -vim-gvim: vim-gvim (gvim, the X/GTK3 enabled version of vim) -vim-gvim: -vim-gvim: Gvim is a graphical version of vim. Vim is an almost compatible -vim-gvim: version of the UNIX editor vi. Many new features have been added, -vim-gvim: such as multi level undo, command line history, filename completion, -vim-gvim: block operations, and more. -vim-gvim: -vim-gvim: The main vim package in the AP series is required to use this package. -vim-gvim: -vim-gvim: Vim's development is led by Bram Moolenaar. -vim-gvim: diff --git a/patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt b/patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt new file mode 100644 index 000000000..3b81553b1 --- /dev/null +++ b/patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txt @@ -0,0 +1,11 @@ +vim-gvim: vim-gvim (gvim, the X/GTK3 enabled version of vim) +vim-gvim: +vim-gvim: Gvim is a graphical version of vim. Vim is an almost compatible +vim-gvim: version of the UNIX editor vi. Many new features have been added, +vim-gvim: such as multi level undo, command line history, filename completion, +vim-gvim: block operations, and more. +vim-gvim: +vim-gvim: The main vim package in the AP series is required to use this package. +vim-gvim: +vim-gvim: Vim's development is led by Bram Moolenaar. +vim-gvim: diff --git a/patches/source/vim/CVE-2022-2816.patch b/patches/source/vim/CVE-2022-2816.patch deleted file mode 100644 index da790fb6d..000000000 --- a/patches/source/vim/CVE-2022-2816.patch +++ /dev/null @@ -1,26 +0,0 @@ -From dbdd16b62560413abcc3c8e893cc3010ccf31666 Mon Sep 17 00:00:00 2001 -From: Bram Moolenaar -Date: Sun, 14 Aug 2022 21:46:07 +0100 -Subject: [PATCH] patch 9.0.0212: invalid memory access when compiling :unlet - -Problem: Invalid memory access when compiling :unlet. -Solution: Don't read past the end of the line. ---- - -diff --git a/src/vim9cmds.c b/src/vim9cmds.c -index 35a382138bf3..93032d6bf154 100644 ---- a/src/vim9cmds.c -+++ b/src/vim9cmds.c -@@ -92,6 +92,12 @@ free_locals(cctx_T *cctx) - int - check_vim9_unlet(char_u *name) - { -+ if (*name == NUL) -+ { -+ semsg(_(e_argument_required_for_str), "unlet"); -+ return FAIL; -+ } -+ - if (name[1] != ':' || vim_strchr((char_u *)"gwtb", *name) == NULL) - { - // "unlet s:var" is allowed in legacy script. diff --git a/patches/source/vim/CVE-2022-2817.patch b/patches/source/vim/CVE-2022-2817.patch deleted file mode 100644 index d9bfc1a66..000000000 --- a/patches/source/vim/CVE-2022-2817.patch +++ /dev/null @@ -1,69 +0,0 @@ -From 249e1b903a9c0460d618f6dcc59aeb8c03b24b20 Mon Sep 17 00:00:00 2001 -From: Bram Moolenaar -Date: Sun, 14 Aug 2022 22:23:02 +0100 -Subject: [PATCH] patch 9.0.0213: using freed memory with error in assert - argument - -Problem: Using freed memory with error in assert argument. -Solution: Make a copy of the error. ---- - -diff --git a/src/testdir/test_assert.vim b/src/testdir/test_assert.vim -index 27b2d73fbfc8..7c9d090b39df 100644 ---- a/src/testdir/test_assert.vim -+++ b/src/testdir/test_assert.vim -@@ -291,6 +291,10 @@ func Test_assert_fail_fails() - let exp = v:exception - endtry - call assert_match("E1174: String required for argument 5", exp) -+ -+ call assert_equal(1, assert_fails('c0', ['', '\1'])) -+ call assert_match("Expected '\\\\\\\\1' but got 'E939: Positive count required: c0': c0", v:errors[0]) -+ call remove(v:errors, 0) - endfunc - - func Test_assert_fails_in_try_block() -diff --git a/src/testing.c b/src/testing.c -index f2355f5dac13..21eb9c18e6e2 100644 ---- a/src/testing.c -+++ b/src/testing.c -@@ -597,6 +597,7 @@ f_assert_fails(typval_T *argvars, typval_T *rettv) - int save_trylevel = trylevel; - int called_emsg_before = called_emsg; - char *wrong_arg_msg = NULL; -+ char_u *tofree = NULL; - - if (check_for_string_or_number_arg(argvars, 0) == FAIL - || check_for_opt_string_or_list_arg(argvars, 1) == FAIL -@@ -660,13 +661,17 @@ f_assert_fails(typval_T *argvars, typval_T *rettv) - } - else if (list->lv_len == 2) - { -- tv = &list->lv_u.mat.lv_last->li_tv; -- actual = get_vim_var_str(VV_ERRMSG); -- expected = tv_get_string_buf_chk(tv, buf); -- if (!pattern_match(expected, actual, FALSE)) -+ // make a copy, an error in pattern_match() may free it -+ tofree = actual = vim_strsave(get_vim_var_str(VV_ERRMSG)); -+ if (actual != NULL) - { -- error_found = TRUE; -- expected_str = expected; -+ tv = &list->lv_u.mat.lv_last->li_tv; -+ expected = tv_get_string_buf_chk(tv, buf); -+ if (!pattern_match(expected, actual, FALSE)) -+ { -+ error_found = TRUE; -+ expected_str = expected; -+ } - } - } - } -@@ -749,6 +754,7 @@ f_assert_fails(typval_T *argvars, typval_T *rettv) - msg_scrolled = 0; - lines_left = Rows; - VIM_CLEAR(emsg_assert_fails_msg); -+ vim_free(tofree); - set_vim_var_string(VV_ERRMSG, NULL, 0); - if (wrong_arg_msg != NULL) - emsg(_(wrong_arg_msg)); diff --git a/patches/source/vim/CVE-2022-2819.patch b/patches/source/vim/CVE-2022-2819.patch deleted file mode 100644 index 59c25d8c3..000000000 --- a/patches/source/vim/CVE-2022-2819.patch +++ /dev/null @@ -1,40 +0,0 @@ -From d1d8f6bacb489036d0fd479c9dd3c0102c988889 Mon Sep 17 00:00:00 2001 -From: Bram Moolenaar -Date: Sun, 14 Aug 2022 21:28:32 +0100 -Subject: [PATCH] patch 9.0.0211: invalid memory access when compiling :lockvar - -Problem: Invalid memory access when compiling :lockvar. -Solution: Don't read past the end of the line. ---- - -diff --git a/src/vim9cmds.c b/src/vim9cmds.c -index ad32c32ff7cb..35a382138bf3 100644 ---- a/src/vim9cmds.c -+++ b/src/vim9cmds.c -@@ -188,10 +188,17 @@ compile_lock_unlock( - size_t len; - char_u *buf; - isntype_T isn = ISN_EXEC; -+ char *cmd = eap->cmdidx == CMD_lockvar ? "lockvar" : "unlockvar"; - - if (cctx->ctx_skip == SKIP_YES) - return OK; - -+ if (*p == NUL) -+ { -+ semsg(_(e_argument_required_for_str), cmd); -+ return FAIL; -+ } -+ - // Cannot use :lockvar and :unlockvar on local variables. - if (p[1] != ':') - { -@@ -223,8 +230,6 @@ compile_lock_unlock( - ret = FAIL; - else - { -- char *cmd = eap->cmdidx == CMD_lockvar ? "lockvar" : "unlockvar"; -- - if (deep < 0) - vim_snprintf((char *)buf, len, "%s! %s", cmd, p); - else diff --git a/patches/source/vim/CVE-2022-2889.patch b/patches/source/vim/CVE-2022-2889.patch deleted file mode 100644 index a5153eaa2..000000000 --- a/patches/source/vim/CVE-2022-2889.patch +++ /dev/null @@ -1,236 +0,0 @@ -From 91c7cbfe31bbef57d5fcf7d76989fc159f73ef15 Mon Sep 17 00:00:00 2001 -From: Bram Moolenaar -Date: Thu, 18 Aug 2022 13:28:31 +0100 -Subject: [PATCH] patch 9.0.0225: using freed memory with multiple line breaks - in expression - -Problem: Using freed memory with multiple line breaks in expression. -Solution: Free eval_tofree later. - -diff --git a/src/eval.c b/src/eval.c -index 42b883e9b00b..60daca51ce9d 100644 ---- a/src/eval.c -+++ b/src/eval.c -@@ -353,6 +353,63 @@ eval_to_string_skip( - return retval; - } - -+/* -+ * Initialize "evalarg" for use. -+ */ -+ void -+init_evalarg(evalarg_T *evalarg) -+{ -+ CLEAR_POINTER(evalarg); -+ ga_init2(&evalarg->eval_tofree_ga, sizeof(char_u *), 20); -+} -+ -+/* -+ * If "evalarg->eval_tofree" is not NULL free it later. -+ * Caller is expected to overwrite "evalarg->eval_tofree" next. -+ */ -+ static void -+free_eval_tofree_later(evalarg_T *evalarg) -+{ -+ if (evalarg->eval_tofree != NULL) -+ { -+ if (ga_grow(&evalarg->eval_tofree_ga, 1) == OK) -+ ((char_u **)evalarg->eval_tofree_ga.ga_data) -+ [evalarg->eval_tofree_ga.ga_len++] -+ = evalarg->eval_tofree; -+ else -+ vim_free(evalarg->eval_tofree); -+ } -+} -+ -+/* -+ * After using "evalarg" filled from "eap": free the memory. -+ */ -+ void -+clear_evalarg(evalarg_T *evalarg, exarg_T *eap) -+{ -+ if (evalarg != NULL) -+ { -+ if (evalarg->eval_tofree != NULL) -+ { -+ if (eap != NULL) -+ { -+ // We may need to keep the original command line, e.g. for -+ // ":let" it has the variable names. But we may also need the -+ // new one, "nextcmd" points into it. Keep both. -+ vim_free(eap->cmdline_tofree); -+ eap->cmdline_tofree = *eap->cmdlinep; -+ *eap->cmdlinep = evalarg->eval_tofree; -+ } -+ else -+ vim_free(evalarg->eval_tofree); -+ evalarg->eval_tofree = NULL; -+ } -+ -+ ga_clear_strings(&evalarg->eval_tofree_ga); -+ VIM_CLEAR(evalarg->eval_tofree_lambda); -+ } -+} -+ - /* - * Skip over an expression at "*pp". - * Return FAIL for an error, OK otherwise. -@@ -435,8 +492,8 @@ skip_expr_concatenate( - // Do not free the first line, the caller can still use it. - *((char_u **)gap->ga_data) = NULL; - // Do not free the last line, "arg" points into it, free it -- // later. -- vim_free(evalarg->eval_tofree); -+ // later. Also free "eval_tofree" later if needed. -+ free_eval_tofree_later(evalarg); - evalarg->eval_tofree = - ((char_u **)gap->ga_data)[gap->ga_len - 1]; - ((char_u **)gap->ga_data)[gap->ga_len - 1] = NULL; -@@ -2274,7 +2331,7 @@ eval_next_line(char_u *arg, evalarg_T *evalarg) - } - else if (evalarg->eval_cookie != NULL) - { -- vim_free(evalarg->eval_tofree); -+ free_eval_tofree_later(evalarg); - evalarg->eval_tofree = line; - } - -@@ -2301,45 +2358,6 @@ skipwhite_and_linebreak(char_u *arg, evalarg_T *evalarg) - return p; - } - --/* -- * Initialize "evalarg" for use. -- */ -- void --init_evalarg(evalarg_T *evalarg) --{ -- CLEAR_POINTER(evalarg); -- ga_init2(&evalarg->eval_tofree_ga, sizeof(char_u *), 20); --} -- --/* -- * After using "evalarg" filled from "eap": free the memory. -- */ -- void --clear_evalarg(evalarg_T *evalarg, exarg_T *eap) --{ -- if (evalarg != NULL) -- { -- if (evalarg->eval_tofree != NULL) -- { -- if (eap != NULL) -- { -- // We may need to keep the original command line, e.g. for -- // ":let" it has the variable names. But we may also need the -- // new one, "nextcmd" points into it. Keep both. -- vim_free(eap->cmdline_tofree); -- eap->cmdline_tofree = *eap->cmdlinep; -- *eap->cmdlinep = evalarg->eval_tofree; -- } -- else -- vim_free(evalarg->eval_tofree); -- evalarg->eval_tofree = NULL; -- } -- -- ga_clear_strings(&evalarg->eval_tofree_ga); -- VIM_CLEAR(evalarg->eval_tofree_lambda); -- } --} -- - /* - * The "evaluate" argument: When FALSE, the argument is only parsed but not - * executed. The function may return OK, but the rettv will be of type -diff --git a/src/proto/eval.pro b/src/proto/eval.pro -index e6cd8928d19c..27a13c9498ba 100644 ---- a/src/proto/eval.pro -+++ b/src/proto/eval.pro -@@ -9,6 +9,8 @@ int eval_expr_valid_arg(typval_T *tv); - int eval_expr_typval(typval_T *expr, typval_T *argv, int argc, typval_T *rettv); - int eval_expr_to_bool(typval_T *expr, int *error); - char_u *eval_to_string_skip(char_u *arg, exarg_T *eap, int skip); -+void init_evalarg(evalarg_T *evalarg); -+void clear_evalarg(evalarg_T *evalarg, exarg_T *eap); - int skip_expr(char_u **pp, evalarg_T *evalarg); - int skip_expr_concatenate(char_u **arg, char_u **start, char_u **end, evalarg_T *evalarg); - char_u *typval2string(typval_T *tv, int convert); -@@ -34,8 +36,6 @@ int pattern_match(char_u *pat, char_u *text, int ic); - char_u *eval_next_non_blank(char_u *arg, evalarg_T *evalarg, int *getnext); - char_u *eval_next_line(char_u *arg, evalarg_T *evalarg); - char_u *skipwhite_and_linebreak(char_u *arg, evalarg_T *evalarg); --void init_evalarg(evalarg_T *evalarg); --void clear_evalarg(evalarg_T *evalarg, exarg_T *eap); - int eval0(char_u *arg, typval_T *rettv, exarg_T *eap, evalarg_T *evalarg); - int eval0_retarg(char_u *arg, typval_T *rettv, exarg_T *eap, evalarg_T *evalarg, char_u **retarg); - int eval1(char_u **arg, typval_T *rettv, evalarg_T *evalarg); -diff --git a/src/testdir/test_vim9_script.vim b/src/testdir/test_vim9_script.vim -index 56a39efcf79b..597e31ec1c26 100644 ---- a/src/testdir/test_vim9_script.vim -+++ b/src/testdir/test_vim9_script.vim -@@ -1560,6 +1560,19 @@ def Test_func_redefine_fails() - v9.CheckScriptFailure(lines, 'E1073:') - enddef - -+def Test_lambda_split() -+ # this was using freed memory, because of the split expression -+ var lines =<< trim END -+ vim9script -+ try -+ 0 -+ 0->(0 -+ ->a.0( -+ ->u -+ END -+ v9.CheckScriptFailure(lines, 'E1050:') -+enddef -+ - def Test_fixed_size_list() - # will be allocated as one piece of memory, check that changes work - var l = [1, 2, 3, 4] -diff --git a/src/userfunc.c b/src/userfunc.c -index f612160fc872..e0bdc3fda911 100644 ---- a/src/userfunc.c -+++ b/src/userfunc.c -@@ -1372,7 +1372,6 @@ get_lambda_tv( - char_u *start, *end; - int *old_eval_lavars = eval_lavars_used; - int eval_lavars = FALSE; -- char_u *tofree1 = NULL; - char_u *tofree2 = NULL; - int equal_arrow = **arg == '('; - int white_error = FALSE; -@@ -1457,12 +1456,6 @@ get_lambda_tv( - ret = skip_expr_concatenate(arg, &start, &end, evalarg); - if (ret == FAIL) - goto errret; -- if (evalarg != NULL) -- { -- // avoid that the expression gets freed when another line break follows -- tofree1 = evalarg->eval_tofree; -- evalarg->eval_tofree = NULL; -- } - - if (!equal_arrow) - { -@@ -1585,10 +1578,6 @@ get_lambda_tv( - - theend: - eval_lavars_used = old_eval_lavars; -- if (evalarg != NULL && evalarg->eval_tofree == NULL) -- evalarg->eval_tofree = tofree1; -- else -- vim_free(tofree1); - vim_free(tofree2); - if (types_optional) - ga_clear_strings(&argtypes); -@@ -1607,10 +1596,6 @@ get_lambda_tv( - } - vim_free(fp); - vim_free(pt); -- if (evalarg != NULL && evalarg->eval_tofree == NULL) -- evalarg->eval_tofree = tofree1; -- else -- vim_free(tofree1); - vim_free(tofree2); - eval_lavars_used = old_eval_lavars; - return FAIL; diff --git a/patches/source/vim/vim-gvim.SlackBuild b/patches/source/vim/vim-gvim.SlackBuild index 53f2686f3..a24a0ada1 100755 --- a/patches/source/vim/vim-gvim.SlackBuild +++ b/patches/source/vim/vim-gvim.SlackBuild @@ -30,9 +30,9 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=vim-gvim -VIMBRANCH=8.2 +VIMBRANCH=9.0 VERSION=$(echo vim-${VIMBRANCH}*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev) -BUILD=${BUILD:-3_slack15.0} +BUILD=${BUILD:-1_slack15.0} # The possible settings for this are yes/no/dynamic. PERLINTERP=${PERLINTERP:-dynamic} @@ -111,12 +111,6 @@ find . \ \( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \ -exec chmod 644 {} \+ -# Fix security issues: -zcat $CWD/CVE-2022-2816.patch.gz | patch -p1 --verbose || exit 1 -zcat $CWD/CVE-2022-2817.patch.gz | patch -p1 --verbose || exit 1 -zcat $CWD/CVE-2022-2819.patch.gz | patch -p1 --verbose || exit 1 -zcat $CWD/CVE-2022-2889.patch.gz | patch -p1 --verbose || exit 1 - config_vim --with-x --enable-gui=gtk3 || exit 1 make $NUMJOBS || make || exit 1 make install DESTDIR=$PKG || exit 1 diff --git a/patches/source/vim/vim.SlackBuild b/patches/source/vim/vim.SlackBuild index b628315ce..2d2cbe5b3 100755 --- a/patches/source/vim/vim.SlackBuild +++ b/patches/source/vim/vim.SlackBuild @@ -23,9 +23,9 @@ cd $(dirname $0) ; CWD=$(pwd) PKGNAM=vim -VIMBRANCH=8.2 +VIMBRANCH=9.0 CTAGSVER=5.8 -BUILD=${BUILD:-3_slack15.0} +BUILD=${BUILD:-1_slack15.0} # The possible settings for this are yes/no/dynamic. PERLINTERP=${PERLINTERP:-dynamic} @@ -152,12 +152,6 @@ find . \ \( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \ -exec chmod 644 {} \+ -# Fix security issues: -zcat $CWD/CVE-2022-2816.patch.gz | patch -p1 --verbose || exit 1 -zcat $CWD/CVE-2022-2817.patch.gz | patch -p1 --verbose || exit 1 -zcat $CWD/CVE-2022-2819.patch.gz | patch -p1 --verbose || exit 1 -zcat $CWD/CVE-2022-2889.patch.gz | patch -p1 --verbose || exit 1 - config_vim --without-x --disable-gui || exit 1 make $NUMJOBS || make || exit 1 make install DESTDIR=$PKG || exit 1 diff --git a/recompress.sh b/recompress.sh index 02aaabdb9..68ef7707a 100755 --- a/recompress.sh +++ b/recompress.sh @@ -1181,12 +1181,8 @@ gzip ./patches/source/python3/python3.distutils.x86_64.diff gzip ./patches/source/seamonkey/autoconf/autoconf-2.13-consolidated_fixes-1.patch gzip ./patches/source/seamonkey/doinst.sh gzip ./patches/source/seamonkey/sm.ui.scrollToClick.diff -gzip ./patches/source/vim/CVE-2022-2889.patch -gzip ./patches/source/vim/CVE-2022-2819.patch gzip ./patches/source/vim/ctags.use-conventional-unused-marker.patch gzip ./patches/source/vim/vim.vimrc.diff -gzip ./patches/source/vim/CVE-2022-2817.patch -gzip ./patches/source/vim/CVE-2022-2816.patch gzip ./patches/source/libxslt/libxslt.xsltMaxDepth.diff gzip ./patches/source/net-snmp/net-snmp-5.7.2-cert-path.patch gzip ./patches/source/net-snmp/net-snmp-5.8-Remove-U64-typedef.patch -- cgit v1.2.3