[CLSA-2025:1761744996] Fix CVE(s): CVE-2022-1927, CVE-2022-2042, CVE-2022-2581, CVE-2022-2849
Type:
security
Severity:
Important
Release date:
2025-10-29 13:36:40 UTC
Description:
* SECURITY UPDATE: Buffer Over-read because of invalid cursor position after "0;" range - debian/patches/CVE-2022-1927.patch: check the cursor position when it was set by ";" in the range - CVE-2022-1927 * SECURITY UPDATE: Use After Free in spell command - debian/patches/CVE-2022-2042.patch: initialize "attr", check for empty line early - CVE-2022-2042 * SECURITY UPDATE: Out-of-bounds Read when regex pattern starts with illegal byte - debian/patches/CVE-2022-2581.patch: do not match a character with an illegal byte - CVE-2022-2581 * SECURITY UPDATE: Heap-based Buffer Overflow with for loop over NULL string - debian/patches/CVE-2022-2849.patch: make sure mb_ptr2len() consistently returns zero for NUL - CVE-2022-2849
Updated packages:
  • vim_8.1.0875-5+deb10u6+tuxcare.els3_amd64.deb
    sha:31c38873b108f950becafc12b1445c83acb950b0
  • vim-athena_8.1.0875-5+deb10u6+tuxcare.els3_amd64.deb
    sha:209509ab565e940b5edabf7c2c31a65852430ba6
  • vim-common_8.1.0875-5+deb10u6+tuxcare.els3_all.deb
    sha:7e679dc72ecbc8f9446961bd78ab903176109243
  • vim-doc_8.1.0875-5+deb10u6+tuxcare.els3_all.deb
    sha:5673ccb08f6bbddf9d5aac7f08cbc7a8960fabe6
  • vim-gtk_8.1.0875-5+deb10u6+tuxcare.els3_amd64.deb
    sha:f282d4b4f85446a192259dd1c3a291bd1f86eb5e
  • vim-gtk3_8.1.0875-5+deb10u6+tuxcare.els3_amd64.deb
    sha:2366cc31225102957182adbf61d8b5e01d42ffe8
  • vim-gui-common_8.1.0875-5+deb10u6+tuxcare.els3_all.deb
    sha:7c5d19ea742e6b5a90059e1d02532bea7528fc0b
  • vim-nox_8.1.0875-5+deb10u6+tuxcare.els3_amd64.deb
    sha:e8bcb7161d4ff2943b579b2ec2a71093c57a4c41
  • vim-runtime_8.1.0875-5+deb10u6+tuxcare.els3_all.deb
    sha:8bc1b361f38240005fe614b542ed89cc77711fe0
  • vim-tiny_8.1.0875-5+deb10u6+tuxcare.els3_amd64.deb
    sha:3a6d73f74307172e07c8c979a3088c88aa10e7da
  • xxd_8.1.0875-5+deb10u6+tuxcare.els3_amd64.deb
    sha:ed57cadac2e131f0705a883632dd757939fc3a85
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.