[CLSA-2022:1671124649] Fix CVE(s): CVE-2022-3591
Type:
security
Severity:
Important
Release date:
2022-12-15 17:17:29 UTC
Description:
* SECURITY UPDATE: Dummy buffer ends up in a window - debian/patches/CVE-2022-3591.patch: Disallow navigating to a dummy buffer - CVE-2022-3591
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:c0ca996473777f43efce4fac27a190d77505da35
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:93b6f5931db041cecee5ecc80db00b2f58311861
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:5872ae178d5aa6fa34f053a8e56bf1617fa2635c
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:be840ec6dd27aba8e9461a21161c892d3f8e751e
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els36_all.deb
    sha:db1aac8b5f7c7efad41187c7b9e28b7cc4f9d6e5
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:b04285e97a1abf96a077195c29a9b02eaf7b935f
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:ddd1c698cb17c88fc915d05716ec952ca4777cb9
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:0b6efc031830c0a4c29ffb37d9c71162d5e22208
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:bfa899db136018fe02cea22162404a60e9445c0b
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:3fac2b4ba64b204fbd58cda1711fe78bca8efe4c
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:c99e77ea88690dad86409f3a69840a3c39cceb37
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els36_all.deb
    sha:c1b449a8b0e843a4230049415ff56d3ffda7aa40
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:0db7edbba0477da78f796855de92a293ed271881
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:720a0c02ee5a2b2249852552b06c299c552dca35
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els36_all.deb
    sha:41c718728dfb9172cf2f1eae9e937c4c7d1674b3
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els36_amd64.deb
    sha:6eadf21d2ae2602b59e4b06befac08fbeb29402e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.