[CLSA-2023:1675372413] Fix CVE(s): CVE-2023-0433
Type:
security
Severity:
Important
Release date:
2023-02-02 21:13:33 UTC
Description:
* SECURITY UPDATE: Reading past the end of a line when formatting text - debian/patches/CVE-2023-0433: Check for not going over the end of the line - CVE-2023-0433
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:b629c77af89be774d14360cdb582fa1641f5f819
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:96e98193c844f39f346b3e4694c1bc93bee3ef84
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:e1b89e9b1eef6de3508474a32170e60743b2352a
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:29ce397b7e6125baf78cea6d6ceab22bf5915f45
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els38_all.deb
    sha:1f1ecfbe291b0410d23bde445ea675fe165ce7bc
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:fa99a29058438ce2d5e1b44edebcf8aee9c42121
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:ee0f30b573a4ee5ca14ea401010ef9b0ea3c21f2
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:122cc8fa7233be1326ab3fc803833db85deddfe1
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:5dea34c15af511450ed6c99a0f3cd8b4116df8f1
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:ea256a17d7e0a992d438342c83588fc5b3f11109
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:be0d62723e45eb289b34af5362b6a2c6924f4b31
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els38_all.deb
    sha:b5f090841ed9e1e8459ea64ad92f26931e891f46
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:a0a95dc49822c8cd0e45fb5056cf584d827d8c87
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:7d94416f3a535069e08aa62d3ddfe99d0e9f3c17
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els38_all.deb
    sha:9b104c81bae2fed19c93bdc36b037352f16c8fce
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els38_amd64.deb
    sha:8df8226656f68ee15e6ad1de7e3d3bfe1cd02053
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.