Release date:
2023-11-08 18:21:04 UTC
Description:
* SECURITY UPDATE: a heap-based overflow
- debian/patches/CVE-2023-0288.patch: prevent the cursor from moving
to line zero
- CVE-2023-0288
* SECURITY UPDATE: an out-of-bounds write
- debian/patches/CVE-2023-0054.patch: check the return value of
vim_regsub()
- CVE-2023-0054
Updated packages:
-
vim_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:b8b28de14ee81eb56ea14b61280c8719e3b91ce4
-
vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:c6689f24648b8a4ea9e280c3568a66e0f5da7dac
-
vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:f0195128b2611cac6e2c176127743ca51d1263ea
-
vim-common_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:31747dcbc259029bdde8ecbc19f4ea008b9dc6ed
-
vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els48_all.deb
sha:f2e6a7ba5e7ea14cfeecebc07e544fbe8715c664
-
vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:0255fcf7259da954757157b8734757c00bf88ea6
-
vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:fb3daebb7f369c859178a559908dec2a9fcad394
-
vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:f6d300a1ade5dfa87fe6d665445b0787585bd31f
-
vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:401df3c989f571097f0157d6281578e483b23306
-
vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:fed291455c5cf8f597d7f1bcbae510c16cbfcd3e
-
vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:09f9468454717eacff55acd9b491120d616931c6
-
vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els48_all.deb
sha:39acf95d3cdac4cd56f81f9f2908b7878580266a
-
vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:5bcf43f6d2d20cce70408526b54af6f3c7d8fdde
-
vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:7b47da947415bc98a59861b97d19c96c3d4e019a
-
vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els48_all.deb
sha:253ee1be9344e8e224224c0280347a2d46809b81
-
vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els48_amd64.deb
sha:8420bdab3d5b6e692850c22b2b4bf1d67eb4a882
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.