package/vim: security bump to version 8.2.4980
Fix CVE-2022-1619: Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution Fix CVE-2022-1620: NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input. Fix CVE-2022-1621: Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution Fix CVE-2022-1629: Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
This commit is contained in:
parent
db14515e87
commit
da66811e8e
@ -1,4 +1,4 @@
|
||||
# Locally computed
|
||||
sha256 f2755fca3b2f47052166dd601a38411b9adbeca0d43885194db8ada4d1a171a3 vim-8.2.4843.tar.gz
|
||||
sha256 5606a3c62dba038f4c4f2eddb305ffccbae58a7bfd569bdb8100f524564c8a32 vim-8.2.4980.tar.gz
|
||||
sha256 0bcab3b635dd39208c42b496568d1e8171dad247cf3da5bab3d750c9d5883499 LICENSE
|
||||
sha256 96970b67f9cb38b0e759946cff22562a3c4b11ce78f62f2117d5e7ecded9ab4d README.txt
|
||||
|
@ -4,7 +4,7 @@
|
||||
#
|
||||
################################################################################
|
||||
|
||||
VIM_VERSION = 8.2.4843
|
||||
VIM_VERSION = 8.2.4980
|
||||
VIM_SITE = $(call github,vim,vim,v$(VIM_VERSION))
|
||||
VIM_DEPENDENCIES = ncurses $(TARGET_NLS_DEPENDENCIES)
|
||||
VIM_SUBDIR = src
|
||||
|
Loading…
Reference in New Issue
Block a user