Slackware: 2022-237-01: vim Security Update | LinuxSecurity.com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  vim (SSA:2022-237-01)

New vim packages are available for Slackware 15.0 and -current to
fix security issues.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/vim-9.0.0270-i586-1_slack15.0.txz:  Upgraded.
  We're just going to move to vim-9 instead of continuing to backport patches
  to the vim-8 branch. Most users will be better served by this.
  Fixed use after free and null pointer dereference.
  Thanks to marav for the heads-up.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923
  (* Security fix *)
patches/packages/vim-gvim-9.0.0270-i586-1_slack15.0.txz:  Upgraded.
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on https://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-9.0.0270-i586-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-gvim-9.0.0270-i586-1_slack15.0.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/vim-9.0.0270-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/vim-gvim-9.0.0270-i586-1.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/vim-9.0.0270-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/vim-gvim-9.0.0270-x86_64-1.txz


MD5 signatures:
+-------------+

Slackware 15.0 packages:
50c8161a95902407943f2462f125625e  vim-9.0.0270-i586-1_slack15.0.txz
34783fad86ea3cb0a7feaf6b075e86b0  vim-gvim-9.0.0270-i586-1_slack15.0.txz

Slackware x86_64 15.0 packages:
0d0a2f31f1c14b0f3c6bf19b3022ef2e  vim-9.0.0270-x86_64-1_slack15.0.txz
c193e6483534a1a918eb081764cf90c9  vim-gvim-9.0.0270-x86_64-1_slack15.0.txz

Slackware -current packages:
77c8ac65b7c36ca695f17a37e390212d  ap/vim-9.0.0270-i586-1.txz
58e3061c901ce65b807cd7b0f8f367dd  xap/vim-gvim-9.0.0270-i586-1.txz

Slackware x86_64 -current packages:
7ed67f54fb7b3150d7d775cf2dc8b6fd  ap/vim-9.0.0270-x86_64-1.txz
1c5fda54ebf95cdb367ae9d26ff841ee  xap/vim-gvim-9.0.0270-x86_64-1.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg vim-9.0.0270-i586-1_slack15.0.txz vim-gvim-9.0.0270-i586-1_slack15.0.txz


+-----+

Slackware: 2022-237-01: vim Security Update

August 26, 2022
New vim packages are available for Slackware 15.0 and -current to fix security issues

Summary

Here are the details from the Slackware 15.0 ChangeLog: patches/packages/vim-9.0.0270-i586-1_slack15.0.txz: Upgraded. We're just going to move to vim-9 instead of continuing to backport patches to the vim-8 branch. Most users will be better served by this. Fixed use after free and null pointer dereference. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923 (* Security fix *) patches/packages/vim-gvim-9.0.0270-i586-1_slack15.0.txz: Upgraded.

Where Find New Packages

Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on https://slackware.com for additional mirror sites near you.
Updated packages for Slackware 15.0: ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-9.0.0270-i586-1_slack15.0.txz ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-gvim-9.0.0270-i586-1_slack15.0.txz
Updated packages for Slackware x86_64 15.0: ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-9.0.0270-x86_64-1_slack15.0.txz ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-gvim-9.0.0270-x86_64-1_slack15.0.txz
Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/vim-9.0.0270-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/vim-gvim-9.0.0270-i586-1.txz
Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/vim-9.0.0270-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/vim-gvim-9.0.0270-x86_64-1.txz

MD5 Signatures

Slackware 15.0 packages: 50c8161a95902407943f2462f125625e vim-9.0.0270-i586-1_slack15.0.txz 34783fad86ea3cb0a7feaf6b075e86b0 vim-gvim-9.0.0270-i586-1_slack15.0.txz
Slackware x86_64 15.0 packages: 0d0a2f31f1c14b0f3c6bf19b3022ef2e vim-9.0.0270-x86_64-1_slack15.0.txz c193e6483534a1a918eb081764cf90c9 vim-gvim-9.0.0270-x86_64-1_slack15.0.txz
Slackware -current packages: 77c8ac65b7c36ca695f17a37e390212d ap/vim-9.0.0270-i586-1.txz 58e3061c901ce65b807cd7b0f8f367dd xap/vim-gvim-9.0.0270-i586-1.txz
Slackware x86_64 -current packages: 7ed67f54fb7b3150d7d775cf2dc8b6fd ap/vim-9.0.0270-x86_64-1.txz 1c5fda54ebf95cdb367ae9d26ff841ee xap/vim-gvim-9.0.0270-x86_64-1.txz

Severity
[slackware-security] vim (SSA:2022-237-01)
New vim packages are available for Slackware 15.0 and -current to fix security issues.

Installation Instructions

Installation instructions: Upgrade the packages as root: # upgradepkg vim-9.0.0270-i586-1_slack15.0.txz vim-gvim-9.0.0270-i586-1_slack15.0.txz

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.