[CLSA-2024:1720776957] vim: Fix of 10 CVEs
Type:
security
Severity:
Important
Release date:
2024-07-12 09:36:00 UTC
Description:
- CVE-2023-0054: check the return value of vim_regsub() - CVE-2023-0049: avoid going over the NUL at the end - CVE-2023-0288: prevent the cursor from moving to line zero - CVE-2023-0433: check for not going over the end of the line - CVE-2023-2610: limit the text length to MAXCOL - CVE-2023-4750: check buffer is valid before accessing it - CVE-2023-4733: verify oldwin pointer after reset_VIsual() - CVE-2023-4751: stop Visual mode when using :ball - CVE-2023-5344: add NULL at end of buffer - CVE-2024-22667: pass size of errbuf down the call stack, use snprintf()
Updated packages:
  • vim-X11-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm
    sha:f3642e8f9d7253a2b8e2c71993c36d9ec21ff84f
  • vim-common-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm
    sha:fc069a7999ace03cd677554130f9b9df62573ecd
  • vim-enhanced-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm
    sha:ddb6866a85468cfdda27fa12c1e193fb21228162
  • vim-filesystem-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm
    sha:5965b9af2a9c899137ce747dd4bf9462bc9502a3
  • vim-minimal-7.4.629-8.el7_9.tuxcare.els1.x86_64.rpm
    sha:abb84fc18498c7336c52bd4828546c6f55ae8422
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.