[CLSA-2024:1710436524] Fix CVE(s): CVE-2024-22667
Type:
security
Severity:
Important
Release date:
2024-03-14 17:15:27 UTC
Description:
* SECURITY UPDATE: stack-buffer-overflow in option callback func - debian/patches/CVE-2024-22667.patch: pass size of errbuf down the call stack, use snprintf() instead of sprintf() - CVE-2024-22667
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:7b47cdf145e3ce453b9b07e59422acb47809263b
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:ae188100a9bdb01687ac5644d38fe8e16c0a950e
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:cc37528f2f1bfb0c0074ff5a7e08d41d948b1cfe
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:f0f32482662485db50bb6f34b11262e3753120c9
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els50_all.deb
    sha:b58b005de42a258863bd9d7519cc42cedae2ad56
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:96a92fb18db9c072700b7ce05445f8b6f1712786
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:cd832d90ee865a0eff232b1ba4335f50dd0bb27a
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:bdce4c0a3083519b24f73f0e755ba8660b8f8eb1
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:eb55d1e5ab2ad36e0128f8e755834048daeacf10
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:4f740eb926cc22c2bd0a464a034bb78176391acf
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:d46134041343526b4808678c741cfb2128eb0d93
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els50_all.deb
    sha:8130df3fcdb81fdcb26923c83b0c49affa7140a5
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:e7019fd4e0eca47a02d1d8626e68cc8a303a1907
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:ea67ef59ac6abe15060b83525e914f8acfa9f8a1
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els50_all.deb
    sha:1ee7324bc709bf72b39be207bb96a712969e4b33
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els50_amd64.deb
    sha:9c919a11a386d160b137520d2601e80acc0bbdcf
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.