[CLSA-2023:1680210210] Fix CVE(s): CVE-2022-47024
Type:
security
Severity:
Important
Release date:
2023-03-30 21:03:30 UTC
Description:
* SECURITY UPDATE: No check if the return value of XCreateGC() is NULL - debian/patches/CVE-2022-47024: Only use the return value when it is not NULL. - CVE-2022-47024
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:bdd4d471bc3d013cf794b1907e7212e9baac4aec
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:da953334de1fbe206d4f548df7459c55aa14d3ab
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:6ddcdb1afecd56cc9cb4ad9a358b4a01bfaeaf5f
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:76e0c9417bd837bb9dcde5e7696e3bc138de95bb
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els41_all.deb
    sha:c5df02425cd4464f25518d62c90c8d3abe47dfc3
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:6b40509b96dc5205eb15b2a37ca8baa830989453
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:642e321f86f6320190735862020a7f14c85e5ad8
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:c0d3d98dfc7fe52cd918c686bbb0a4ec6d9af8f6
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:f5baa9bf770d48782f8949040a18df3107ee2e0f
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:e4cf7abb258790a3a91d63188a31a0c16c89571e
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:1968228ff918c282cf84a24156eb7124d88881b3
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els41_all.deb
    sha:2ac9071e5bb3eb423928bd7a692abb69fa06f552
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:3ed33c9fcccd871020f3701c47e9fecbc22dae84
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:e1cb2cd8a095f46d5fd166841b69c660fb37170f
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els41_all.deb
    sha:d72f5b0093e193a6361e7050aea967b7050bc582
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els41_amd64.deb
    sha:5f72fbc0a77199ebbebd7b34bcdc466ca26ba478
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.