Release date:
2025-11-06 18:59:13 UTC
Description:
* SECURITY UPDATE: segmentation fault in silent Ex mode due to scrolling
function vulnerability
- debian/patches/CVE-2025-24014.patch: Fix segfault in win_line() by
checking that ScreenLines is not NULL in gui_do_scroll()
- CVE-2025-24014
Updated packages:
-
vim_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:9d0857423da789b397f94320d6cffba7ed2a939b
-
vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:b7b052314b2c350d3323f5078a32f68c0218616c
-
vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:747ec2f5d9efaf3beac3eb25aece6c7135ea57e3
-
vim-common_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:89b12fe329bdf0b089a5d063b391c73a54488c45
-
vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els55_all.deb
sha:0686445db2c6b6e8d062996b82a3ea74429f3d47
-
vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:9d789e4501680dfda04e30472c291437bdf65a56
-
vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:deb45a206296b91483470d6235c67382bdad594f
-
vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:0157b0b04958398b2b966e182e3efa57269cac46
-
vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:30d83b516fadcf46332ce7d731d730b595850e7f
-
vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:ef71b80fbf4dba3096c454645dbc9bc214a91241
-
vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:fb9db1fed69bcdad02e1803a8986bc619f09b469
-
vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els55_all.deb
sha:956012bfedfeb9e8095daa80244a52bbda43fe68
-
vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:e3722dcce278e129ac11e1f11699ef29cb0dc096
-
vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:9ac5b0992d4a99332fcb22022782534a755f11cb
-
vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els55_all.deb
sha:11f7636ca5fb69458c6925c115ec2cc380b3f517
-
vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els55_amd64.deb
sha:fe7416caa9783e1a439a32faea938848b34b26f0
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.