[CLSA-2022:1649869251] Fix CVE(s): CVE-2022-1154
Type:
security
Severity:
moderate
Release date:
2022-04-13 17:00:51 UTC
Description:
* SECURITY UPDATE: Using buffer line after it has been freed - debian/patches/CVE-2022-1154.patch: After getting mark get the line again - CVE-2022-1154
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:dd42743f1f98e680d210b745da61768da26f00ae
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:f5e5d79de9726587ecd1dd04ef89d925d8966fd2
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:d6e313088734b10e65aa92d9ed29053782e4e3c8
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:1ffc36872a3ef25e89f02ec54d14faf83e07d824
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els11_all.deb
    sha:f30534bdba77d0f2afff2efb90c0f6a8deecbc95
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:dbb51138038c72e0dc2e157a6f06906cda24b90b
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:04aafa5a77bcaab3949c2bdd037a446de23c1958
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:8e545debea018c13fb85b6469bb44a528271437b
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:b0cf62cab768fd7e0fad0b906887d66468315eb6
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:34b843946946a61a2c6351919fb1a5989ccf84bb
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:a56c5ffd6a28b35340c5e39ac8953391e2c73213
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els11_all.deb
    sha:30be28c9b99f17852bf37978b36c994808d9282f
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:b4db3384ffbc462f97bf109a13e3d804442e0a13
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:ab68ac3b2626dd1c0b8952ef9dd2225f6d63e102
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els11_all.deb
    sha:4e26452c63a3da7a432766ee4ec139077069b9ea
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els11_amd64.deb
    sha:746900fff362d167259dfee36446c06c922345d7
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.