Release date:
2022-08-17 18:37:49 UTC
Description:
* SECURITY UPDATE: Illegal memory access when pattern starts with illegal
byte
- debian/patches/CVE-2022-2581.patch: Do not match a character with an
illegal byte
- CVE-2022-2581
Updated packages:
-
vim_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:263b6b5a6870144d7c95a49b493f43f33cb57c08
-
vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:a05ac45ac2194bf7ae50ad830367b61b84f45fe1
-
vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:c9caec443ac3d1cb0f3d72c31fd04e0877353332
-
vim-common_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:4181ccb5916d7ec338c4753c3b36c0fdac2a3f9a
-
vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els26_all.deb
sha:c142992d80fafd9e74b6343dcdc694f6af9f1798
-
vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:2155f222e7a15f0e2180702b3061d1bb19e68de1
-
vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:e23167bdffabe9bb8ebd570c2e64d973568e33d8
-
vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:946775b502e9435322c2463c2ae5cb08c8fd78a9
-
vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:6a905f15fc81164ebd2c5b96c5bde743260527e7
-
vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:f3989a49587af0384a223980f421afc1771bca9c
-
vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:cffce0845caf8fc61a9f39f0124ae873c3b723fc
-
vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els26_all.deb
sha:014478ca20f535079783a6f8a748d2b4f5151929
-
vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:6fdcfc90d0ee901664ffb634c1ca2292e6b6c1ce
-
vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:61a2d20caccad06b3abe9cbf16f1d5c121f8feaf
-
vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els26_all.deb
sha:a08770da29c66db1e202e3acd89b13a7822b8f5a
-
vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els26_amd64.deb
sha:812e9914726175a2060a1c530f4b5e92192e2960
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.