[CLSA-2023:1678820123] Fix CVE(s): CVE-2023-1175
Type:
security
Severity:
Important
Release date:
2023-03-14 18:55:23 UTC
Description:
* SECURITY UPDATE: Illegal memory access when using virtual editing - debian/patches/CVE-2023-1175: Make sure "startspaces" is not negative - CVE-2023-1175
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:87a688109cd71361f19054e6d2fb9fdf06f844aa
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:29d126f0cb8937b3e031aab70e479ebd441efbfe
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:2146d067f9c87cc2b2aad805548396e372651460
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:c621e85455df3bfbc36f039ed2b1411b26062ed1
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els39_all.deb
    sha:0b4136329f9f31433b75b10be553da4f97cada7b
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:6a92b51376b7632a815d6d47a245a71ba8c4f445
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:6d9357e6aff3a7d8415ea6fb0b2400d4e17e2315
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:c67d2612619a3e33ea4ef4b634bf445e6ac2008c
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:c9127b1efa6eff5d3b8382522a21be8ab9178ba1
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:3d318f51d3f44f8f0b6c07f5da1e3e7efd6551b3
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:3edb7b00d886cc41264ab86a413f732c5089c9b4
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els39_all.deb
    sha:170f4d4249f3157263a3215329b1c38d226fcbf1
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:e6c9405d1c5ef47edf547ad78f6165dafbef96d0
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:48a6cd199a92c39ce004f35abc7bd42958402583
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els39_all.deb
    sha:d81cac9989473483c9bf3cd64e65c330ce988088
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els39_amd64.deb
    sha:71b2dc3e2bc0f9404901a4be66660bb21c68622e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.