[CLSA-2022:1664475299] Fix CVE(s): CVE-2022-3256
Type:
security
Severity:
Important
Release date:
2022-09-29 18:14:59 UTC
Description:
* SECURITY_UPDATE: Using freed memory when autocmd changes mark - debian/patches/CVE-2022-3256.patch: Copy the mark before editing another buffer - CVE-2022-3256
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:a09e12a3a07184c599fca7bd39716f9a58fd9fb4
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:52720fc4a989f01ced37d76f3a8b10b03f0667b5
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:fc0533f599f71adcb152de7e06792e4cce2c5dc3
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:f5bce2c64baafc0b8cfe65d68a24d6148103372d
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els31_all.deb
    sha:f07f1414467dc2612cc7dd9f109ce56f3fb17a96
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:63b587f20ea82c398cb99e0d5a47582238bec8e2
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:ed5e547056d4d9b9fd7fa69be0a7f32d6198838a
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:b41a0cb4cf530c60277c0390d0bba471a1a01d22
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:14a6c30e1af09b6d7f763c3f3224feda6ed20bc5
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:f533956c0fd7b529b32f9d0a996912c1616ac587
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:52a8a90232d27f8371fe1fff8a0e367382e6e3b8
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els31_all.deb
    sha:7335d95ebb3ca18926511b9e372fecc7d07ef775
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:fa660978df228468f99cb6df26ed913c4e733fef
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:f1b928ef7a87ae3e016692dc2b6cb6fd4c57bafc
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els31_all.deb
    sha:c2460088ba5de0ee7762295281e1c3c3f012ae2e
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els31_amd64.deb
    sha:c3f6d71f11ca8391d0106b9d6c9a43d09312a7bb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.