[CLSA-2025:1736503187] Fix CVE(s): CVE-2024-47814
Type:
security
Severity:
Low
Release date:
2025-01-10 10:00:53 UTC
Description:
* SECURITY UPDATE: fix use-after-free vulnerability in buffer closing - debian/patches/CVE-2024-47814.patch: Fix use-after-free issue when closing a buffer by checking for deletions before editing - CVE-2024-47814
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:a190a54fb2ba590b6d6188eca84e9ef4f32c48d0
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:b15553ac711fdb15043170faa1c0ed67726c8ba2
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:7782b4190b0069d4e0ffdf0c371c5de8e55c65a6
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:438556ca8af6f648edfc12852219f810d9fcb9bc
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els53_all.deb
    sha:292406329aecaf3de1deddc65e810c74c7477082
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:c16b0b9dec160d534dd7d30bb19ee2015003aa4d
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:a1e189c9bc41182079b36cc82c6c8841d94e63ad
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:d47f7cbf3e323c46566c7371d12059851bd2cdd0
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:3f101c67d19425f73255dac00cf1778fdc497eeb
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:517d0f459efcaea212f6685743d155b303c0b4ae
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:875cd1f655b2668e6a331ac24eb1fc75b79cbc4b
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els53_all.deb
    sha:0dd09851351c02143a1a5a831679075d8da54f57
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:2d59ac0fa58e0ecbbf3d1ad73bc9ef17fcb46b1f
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:495225e7bdb44fac1fbfa2baa7534ca5a8d6d9d6
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els53_all.deb
    sha:2844aff07ac9b7e794c7bb866a6c7735dbd97129
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els53_amd64.deb
    sha:c20adb41dc60d1db567c1a97c012caeeca081efa
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.