mirror of
git://slackware.nl/current.git
synced 2025-01-03 23:03:22 +01:00
8ea2d78564
patches/packages/curl-8.0.1-x86_64-1_slack15.0.txz: Upgraded. This update fixes security issues: SSH connection too eager reuse still. HSTS double-free. GSS delegation too eager connection re-use. FTP too eager connection reuse. SFTP path ~ resolving discrepancy. TELNET option IAC injection. For more information, see: https://curl.se/docs/CVE-2023-27538.html https://curl.se/docs/CVE-2023-27537.html https://curl.se/docs/CVE-2023-27536.html https://curl.se/docs/CVE-2023-27535.html https://curl.se/docs/CVE-2023-27534.html https://curl.se/docs/CVE-2023-27533.html https://www.cve.org/CVERecord?id=CVE-2023-27538 https://www.cve.org/CVERecord?id=CVE-2023-27537 https://www.cve.org/CVERecord?id=CVE-2023-27536 https://www.cve.org/CVERecord?id=CVE-2023-27535 https://www.cve.org/CVERecord?id=CVE-2023-27534 https://www.cve.org/CVERecord?id=CVE-2023-27533 (* Security fix *) patches/packages/vim-9.0.1418-x86_64-1_slack15.0.txz: Upgraded. Fixed security issues: NULL pointer dereference issue in utfc_ptr2len. Incorrect Calculation of Buffer Size. Heap-based Buffer Overflow. Thanks to marav for the heads-up. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-1264 https://www.cve.org/CVERecord?id=CVE-2023-1175 https://www.cve.org/CVERecord?id=CVE-2023-1170 (* Security fix *) patches/packages/vim-gvim-9.0.1418-x86_64-1_slack15.0.txz: Upgraded.
11 lines
503 B
Text
11 lines
503 B
Text
vim-gvim: vim-gvim (gvim, the X/GTK3 enabled version of vim)
|
|
vim-gvim:
|
|
vim-gvim: Gvim is a graphical version of vim. Vim is an almost compatible
|
|
vim-gvim: version of the UNIX editor vi. Many new features have been added,
|
|
vim-gvim: such as multi level undo, command line history, filename completion,
|
|
vim-gvim: block operations, and more.
|
|
vim-gvim:
|
|
vim-gvim: The main vim package in the AP series is required to use this package.
|
|
vim-gvim:
|
|
vim-gvim: Vim's development is led by Bram Moolenaar.
|
|
vim-gvim:
|