[CLSA-2022:1660761469] Fix CVE(s): CVE-2022-2581
Type:
security
Severity:
Important
Release date:
2022-08-17 18:37:49 UTC
Description:
* SECURITY UPDATE: Illegal memory access when pattern starts with illegal byte - debian/patches/CVE-2022-2581.patch: Do not match a character with an illegal byte - CVE-2022-2581
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:263b6b5a6870144d7c95a49b493f43f33cb57c08
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:a05ac45ac2194bf7ae50ad830367b61b84f45fe1
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:c9caec443ac3d1cb0f3d72c31fd04e0877353332
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:4181ccb5916d7ec338c4753c3b36c0fdac2a3f9a
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els26_all.deb
    sha:c142992d80fafd9e74b6343dcdc694f6af9f1798
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:2155f222e7a15f0e2180702b3061d1bb19e68de1
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:e23167bdffabe9bb8ebd570c2e64d973568e33d8
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:946775b502e9435322c2463c2ae5cb08c8fd78a9
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:6a905f15fc81164ebd2c5b96c5bde743260527e7
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:f3989a49587af0384a223980f421afc1771bca9c
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:cffce0845caf8fc61a9f39f0124ae873c3b723fc
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els26_all.deb
    sha:014478ca20f535079783a6f8a748d2b4f5151929
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:6fdcfc90d0ee901664ffb634c1ca2292e6b6c1ce
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:61a2d20caccad06b3abe9cbf16f1d5c121f8feaf
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els26_all.deb
    sha:a08770da29c66db1e202e3acd89b13a7822b8f5a
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
    sha:812e9914726175a2060a1c530f4b5e92192e2960
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.