[CLSA-2022:1671124583] Fix CVE(s): CVE-2022-4292
Type:
security
Severity:
Important
Release date:
2022-12-15 17:16:23 UTC
Description:
* SECURITY UPDATE: Using freed memory after SpellFileMissing autocmd uses bwipe - debian/patches/CVE-2022-4292.patch: Bail out if the window no longer exists - CVE-2022-4292
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:93aeb64132d834d9aa5ba84a0ba4034b9171707d
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:fe44f1dc9cc4c2dc8b718b001646c338876688ce
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:8e29ed7c703878d4262802a8bc006c695c600fce
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:d6ca1d4f139e760c54d77808f48ceb80bbf8c034
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els35_all.deb
    sha:7d80c818d6eadd4a5ce3ceafdb4ad9bdf7ff4e9c
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:9e4d1e41443ab16bf16bb4505e55e8de5df26c18
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:2a4ae7ebe36648e8d9ffcbbc083d272346ab4280
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:ba7386e2e4f09db0d122c368d3826e6dd540aa18
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:7dd30ff6553ff6476241edf0f83eeb26e367555a
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:670c0b425f21d6c20a8e0525eafe510e455a6790
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:af5337f363857e4bea1550f76147ce4e7581ce50
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els35_all.deb
    sha:b28fda7e8f9d1f6922ca12ad2d18df61c808955d
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:d897d748fd4900715756d12e88fcb6fe95c3a10f
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:6948cede88c9bee928f592b4519f41f0dcb75bae
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els35_all.deb
    sha:1f2d5988c16c00ced2ec301daac079f545af2e90
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els35_amd64.deb
    sha:40df1f87663ab324538f782462a5244c7b7662d3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.