[CLSA-2023:1685972217] Fix CVE(s): CVE-2023-2609
Type:
security
Severity:
Important
Release date:
2023-06-05 13:37:03 UTC
Description:
* SECURITY UPDATE: NULL pointer dereference in get_register() - debian/patches/CVE-2023-2609.patch: Check "y_array" is not NULL - CVE-2023-2609
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:a9a7d7f9e1654e8e5436b4a5b69541bb130b98ee
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:8deba8977093a8ab75153bbf8d5a139d06daaa9d
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:ec98405d0cf6f3b2f0f98772940885d944001c5f
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:3b4b80ef30275554b03737c95ad51b3005cef82f
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els43_all.deb
    sha:0c36017f4bd9b655eaf99914d739608d1cde6ffb
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:0c0960deeb0b0a76d5d9910fb6f1deace1f8e99a
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:bdaed77dce43c0c7d74daf9d744ad6032ba2a508
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:f89bd0fbe2296d77603acedb32af141fc1d8d799
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:eb3c8ae140dd02a3f51f5072a6534c9dc07b4a47
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:1e3b36809011c5f26273c3d5d30eef7cbb3c6992
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:e43b7a49f7d04cda7672d2f0eec9f27857a79667
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els43_all.deb
    sha:8baec1614758981c8dfdb28d67d168eb54db9d5a
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:7e082d3908100175e3bf4bb69651fdb22d310b53
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:fe2810c382ade39c60f8fd3211fb8999ec05fe74
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els43_all.deb
    sha:e90e07b2206b191efd277cf9ab4c540c0916296e
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els43_amd64.deb
    sha:99add8a770122ebdda2f670d3c36fc4e3fbaabfe
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.