[CLSA-2023:1679925211] Fix CVE(s): CVE-2023-1170
Type:
security
Severity:
Moderate
Release date:
2023-03-27 13:53:31 UTC
Description:
* SECURITY UPDATE: Accessing invalid memory with put in Visual block mode - debian/patches/CVE-2023-1170: Adjust the cursor column if needed - CVE-2023-1170
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:b8c1152528b4c3a83250818e0c33412be8243958
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:c3d703f388f0f2bfdca9e081078b36e4eefc6dad
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:70d657b471d3d88dfb8a101eda19daa3ea0fce67
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:cc581f9227bb045bae35b19214cbdb061df3083f
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els40_all.deb
    sha:1620b60441cee964140d5e77d3845d7067929a51
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:285b562c6ad1bf5db1e541f40eae37a2201dbaf9
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:507fab99959bbe24c581a8247ba1b448c9b06d5f
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:c00b69cc0f4c76804bbbea2a3419b7fe67626341
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:c501a61618a5c288ab821897c0cbafbfa4cfd2f3
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:5a1b7bfdafd4d597646234173b34c893621f90c5
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:dea7baeee486d37e830a5d3fd6992d6bb4e240af
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els40_all.deb
    sha:0ab3681e16832df5d9f77055f964fbfdf920fa4a
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:4223fb7ddf213610fca6ae55f2ef1c18ea054203
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:faa6d9a7c00cfb18f4ab32aa74d608632b4649ad
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els40_all.deb
    sha:f9f3b065ade31f2b53a217539a63eb82890e41df
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els40_amd64.deb
    sha:dcf7fdc5c1d21f2d3a8e2346425c9a9819e118bf
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.