Release date:
2022-07-26 17:28:59 UTC
Description:
* SECURITY UPDATE: Accessing freed memory with diff put
- debian/patches/CVE-2022-2289.patch: Bail out when diff pointer
is no longer valid
- CVE-2022-2289
* SECURITY UPDATE: Spell dump may go beyond end of an array
- debian/patches/CVE-2022-2304.patch: Limit the word length
- CVE-2022-2304
Updated packages:
-
vim_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:a284537814f443826a1a2515f4cd9a042549d4a2
-
vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:f928d44cd9184d694c6de912d705042c5763049b
-
vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:bab4a6f4693f3f1933564084bbb54883bba7271c
-
vim-common_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:b5a00f8ca38cb5912eb11da4b90bfe423448e672
-
vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els24_all.deb
sha:1d4c0589a0d28b8bce42c93c5aba40d3b5968652
-
vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:61fea1f372ad10d76d36c4473bf52f9cc860049e
-
vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:09c2fedcd72f15383d01b52946ab0f54193315fb
-
vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:98133545a3ec0bc6caa5b20daa80cd1c3f3f503d
-
vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:fd319e6aefe7b2157d66be1847adbc3757eb89e5
-
vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:d4482e064aa4cb1d716e1d23c000c5567836e5e1
-
vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:d115a56a40fb8bbe162f6bfe473856dbf11c0e22
-
vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els24_all.deb
sha:669223db67d58f8bde16d90317f7d02fa4c2241e
-
vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:74cb64283bcd43176a31a58193022a4247a890c0
-
vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:7c1760c87d3aae20bac6aa93021402dbedaa2999
-
vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els24_all.deb
sha:f20db692f145421727f7f90a93537e7db26e7025
-
vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els24_amd64.deb
sha:04bba7eb6fd521a0d4b18fd4d3c573e75cc15c0d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.