Release date:
2024-10-17 19:33:42 UTC
Description:
* SECURITY UPDATE: prevent heap-buffer overflow in typeahead buffer
flushing
- debian/patches/CVE-2024-43802.patch: fix heap-buffer-overflow in
ins_typebuf() by validating enough space left when flushing
typeahead buffer
- CVE-2024-43802
Updated packages:
-
vim_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:8b2b4c1943a1a1a36a62838744dfc93f56b140ab
-
vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:332a2cf05ad19e60c42ed6ed2b8639b0399a71c0
-
vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:3b1a7ef1b8f0af93310a7bed0a74016cebbb5a73
-
vim-common_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:24154cd7668a514cf4d0c33132700e59c2ba5b87
-
vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els51_all.deb
sha:bc4f3656e9971afe6180961eee8817f2dcb7ff45
-
vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:6d3370126f88fb965c5b8450fda4fee2606a1137
-
vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:ff4fc6dcd0617ed8250db0685341006dd6aba646
-
vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:54ffbb4509d94a29c77b046a47ef0b28bfb0662e
-
vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:9c22e294c5262b9e9fe8c3c7586b1230c8a60086
-
vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:2529ad9311ffcf2c3e1557396c0eb335bda9e9eb
-
vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:d15b94795ea0ffc603f8a9bcbd89d63ebae7ff13
-
vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els51_all.deb
sha:027c4733ef9a36f924427e85fb77238d0f5ccffa
-
vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:c4ac792a00cb1794dc3a67cb51759e5e30a1d72d
-
vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:9106493be1fc88f55d600f9132879c8d66c8342f
-
vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els51_all.deb
sha:f6f45118319bbfd42eece192858ffad8b511b827
-
vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els51_amd64.deb
sha:93e4c000c5e8886b297eff956001e6b0ccc2de7a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.