[CLSA-2025:1756928197] Fix CVE(s): CVE-2025-26603
Type:
security
Severity:
Moderate
Release date:
2025-09-03 19:36:41 UTC
Description:
* SECURITY UPDATE: fix use-after-free vulnerability in buffer closing - debian/patches/CVE-2025-26603.patch: Fix heap use-after-free in str_to_reg() - CVE-2025-26603
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:14045de46a55c1d42079a7cfa089954a37ef8ad9
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:6d4ed5aee496cf1e00b336d9eab4eaccb2d9036a
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:b6943555f27d3a12bf8674665e58c22bf364290c
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:a776c35baf169e5df0842c83d79602d65712bc65
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els54_all.deb
    sha:7427e36430e0ba31974aa4dc526f6fa70de62e62
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:f6b6b18aa945356dc76de7bd8aedad820dad5c29
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:80cea48b90b74d77245743747391e51d42823b30
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:f80b8732abdd6981200fd73dc54d872ac8ff96c3
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:8c82ba1a37ba628c91c1c81c79ae52a2ea13a803
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:3dd3d2c71291f15b018da5237759be980079af81
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:d7ffdb2c3f09cf4c0bf9a33d45f539f6d0f027ac
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els54_all.deb
    sha:c3cf11e6e482b1fff72624f318e9507c430ed606
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:3ca0744a7d9b4d1ca3569fcd350e5e2396285039
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:7aa475f1f27c15c3a19849d59cc5328acd8a4201
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els54_all.deb
    sha:d22e2cf5c495fca1399b844d0cb3b87422cbbec1
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els54_amd64.deb
    sha:8afcb28b22ff3af4defc757f19373b62015606d1
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.