[CLSA-2022:1653326657] Fixed CVEs in vim: CVE-2022-1629, CVE-2022-1621, CVE-2022-1616, CVE-2022-1620, CVE-2022-1619
Type:
security
Severity:
Important
Release date:
2022-05-23
Description:
- CVE-2022-1619: fix going before the command line start with latin1 encoding - CVE-2022-1620: fix NULL pointer dereference when using invalig regexp - CVE-2022-1621: fix to avoid adding invalid bytes with :spellgood - CVE-2022-1629: fix reading past end of line if ended with trailing backslash - CVE-2022-1616: fix buffer overflow with invalid command with composing chars
Updated packages:
  • vim-X11-7.4.629-5.2.el6.tuxcare.els12.x86_64.rpm
    sha:cbb8c74396e4399febd28157ea0425555dd4db98
  • vim-common-7.4.629-5.2.el6.tuxcare.els12.x86_64.rpm
    sha:b319b4133107e8a450f6a3ce66c8a8339475d340
  • vim-enhanced-7.4.629-5.2.el6.tuxcare.els12.x86_64.rpm
    sha:35b03e6d704711ce1a5c64172d7a6cef5459f76f
  • vim-minimal-7.4.629-5.2.el6.tuxcare.els12.x86_64.rpm
    sha:0c165075aa37235d10c3b972611494e855e577d8
  • vim-filesystem-7.4.629-5.2.el6.tuxcare.els12.x86_64.rpm
    sha:7f7885fc2a676a47da784480f240de841b319421
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.