[CLSA-2024:1730133086] Fix CVE(s): CVE-2024-43374
Type:
security
Severity:
Low
Release date:
2024-10-28 16:31:30 UTC
Description:
* SECURITY UPDATE: use-after-free in alist_add() - debian/patches/CVE-2024-43374.patch: lock the current window so that the reference to the argument list remains valid - CVE-2024-43374
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:59458639a4bc41fa93788b48464c934cbb11cf46
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:f7a99e7d91689bb5e657510266327d2c49b3bbbe
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:81ccd780c6b1bf53b1442083922a61121611bd53
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:93dcaee2fa8555510f30720de85acdaecd5a7b09
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els52_all.deb
    sha:fa9628b2040656f849955fc533895bfdee4a411e
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:8d3b683bf500d30eb21524bd8a12a7a8e695c658
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:847f08ac670c6e17e23a19236f45abc6847ef064
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:3aa66d6c274f98231d6d68a75717d9fef84d32cc
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:58ed29f2eda71dae1605b4969cd8c5c7868a53ce
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:13ea350c31fe1989424970f826d93f739becc638
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:07bdff7edf1666797c011b565477a6d7e8e64c56
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els52_all.deb
    sha:89cbc2b5e7c78a708c672d15568e710d98bcf3ce
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:9ecfed0bc67f768ea827e8656e8b428f82d1809d
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:688e79f147788ac50ea3f02eb5c42c5f2cf1e9bc
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els52_all.deb
    sha:44fc4c8aa2aae9913e698d881cf3e649f64b4cac
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els52_amd64.deb
    sha:23a10637799e697dce89843ccadb9db498f5726b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.