[CLSA-2022:1655901847] Fix CVE(s): CVE-2022-2042
Type:
security
Severity:
Critical
Release date:
2022-06-22 12:44:07 UTC
Description:
* SECURITY UPDATE: Using uninitialized value and freed memory in spell command - debian/patches/CVE-2022-2042.patch: Initialize "attr" and check for empty line early - CVE-2022-2042
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:528926fb43955d34af1d03810757e2aa8bc28c6c
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:87e376791aa358d8fc12177dc0ab0d1c26df7ff7
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:8fdb7615197729b7dc085f2695b187563d5d6cd2
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:7aed59c0c8f927c773bf322b92517fdbcc9624f7
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els19_all.deb
    sha:9f3d4f217162b7640bd4fa410178e8e16c5cc05d
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:64a6142a927ea5cd8ee7fc7d3c8c9340d73aefc3
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:0c43c768d3c138cfbe0b137614fb80ca1c373aed
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:ee16644031c38e489207067772d616780a1348d0
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:f5bfa5d5e772ffb5fb0c9fe4a110e5d757ddeb3e
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:9a967ced9e01fb9ba386f1635abe74704f2c94f1
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:67ebe7b5b4652c42cd05e12d9020fc05a5dd1da1
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els19_all.deb
    sha:8b6c1a7154dc7e09b1c387c1366c4ff4a5d9c22d
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:4dd1e1f35c38a8a3ff79d03ed5b8c1d94d22e194
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:fbd7a6a9eb788a5392f917ccf283c1dfb651c57c
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els19_all.deb
    sha:ec57383032b3c4f3eba911988acf02ed48720ae3
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els19_amd64.deb
    sha:11e08994f917b5f513f7432068838cbb12df2961
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.