[CLSA-2025:1761845210] Fix CVE(s): CVE-2022-1733, CVE-2022-1796, CVE-2022-1886, CVE-2022-3016
Type:
security
Severity:
Important
Release date:
2025-10-30 18:06:08 UTC
Description:
* SECURITY UPDATE: Heap-based Buffer Overflow - debian/patches/CVE-2022-1733.patch: Check for NUL to prevent reading past end of the line when C-indenting - CVE-2022-1733 * SECURITY UPDATE: Use After Free - debian/patches/CVE-2022-1796.patch: Fix accessing freed memory when line is flushed by making a copy of the search pattern - CVE-2022-1796 * SECURITY UPDATE: Heap-based Buffer Overflow - debian/patches/CVE-2022-1886.patch: Check the length is more than zero to fix access before start of text with a put command - CVE-2022-1886 * SECURITY UPDATE: Use After Free - debian/patches/CVE-2022-3016.patch: Return QF_ABORT when location list changed in autocmd - CVE-2022-3016
Updated packages:
  • vim_8.1.0875-5+deb10u6+tuxcare.els5_amd64.deb
    sha:c10968f2f1b7dabe40eedbf0de59161e805a4e73
  • vim-athena_8.1.0875-5+deb10u6+tuxcare.els5_amd64.deb
    sha:fce7d20bf450c4140acb7d9944b3afa45d17f817
  • vim-common_8.1.0875-5+deb10u6+tuxcare.els5_all.deb
    sha:4f4f9ea66a32349a2639c07c1816f371fee1a441
  • vim-doc_8.1.0875-5+deb10u6+tuxcare.els5_all.deb
    sha:352378dd7bad30e6b01f32a44960d3fc53dc5f48
  • vim-gtk_8.1.0875-5+deb10u6+tuxcare.els5_amd64.deb
    sha:8157c9b930756f562a98b786bfc228399b14833b
  • vim-gtk3_8.1.0875-5+deb10u6+tuxcare.els5_amd64.deb
    sha:3d1549ce192466a9518e1bbd7a1a8433614bd6f1
  • vim-gui-common_8.1.0875-5+deb10u6+tuxcare.els5_all.deb
    sha:35c0896361ce9ebbfbf6c1ca92df5c5bb96a1d94
  • vim-nox_8.1.0875-5+deb10u6+tuxcare.els5_amd64.deb
    sha:6004aaca43fbf2fa55a0b926b2dfc41f17e4ebba
  • vim-runtime_8.1.0875-5+deb10u6+tuxcare.els5_all.deb
    sha:33f48e14361be0127e4da02495fa93e358228a2e
  • vim-tiny_8.1.0875-5+deb10u6+tuxcare.els5_amd64.deb
    sha:472b9e20221f48ac388524440a684e63f5315d39
  • xxd_8.1.0875-5+deb10u6+tuxcare.els5_amd64.deb
    sha:b511091b79ac5f02d54230f9f24ec7c4ccd58405
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.