[CLSA-2023:1674814283] Fix CVE(s): CVE-2023-0049
Type:
security
Severity:
Important
Release date:
2023-01-27 10:11:23 UTC
Description:
* SECURITY UPDATE: Out-of-bounds read in function build_stl_str_hl - debian/patches/CVE-2023-0049: Stop reading from buffer at "%0" - CVE-2023-0049
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:b4b13c69eb88fef3b6301cc664af70e3830bc328
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:f6af0d2b5631ca9e89d4a5109f2df1fb2f94b6fb
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:1e1c0b692ac4d30c27e041f3729743cbc1845919
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:77ba10d81dea837c56d7afc6e63bea87c90b610c
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els37_all.deb
    sha:1c7237fe8b3b4bf74ad5c92ee0c6b618a3d3dd02
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:9f6d52372e4c67e7edc0ab7ba89ad2b85ef43c7d
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:f3bb415ac8e91917a8ecc46991ef8d4d85480a5c
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:adea7d6c231c81dda260531934bd6faada2d3967
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:950f957b28c1f25c729d1b37e3548abc48b12ca3
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:c991117d801fca4828ead1bc656e2449da9e93a7
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:30dbefbc2dbf3fb67f32c98f38f58bfb9d80b538
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els37_all.deb
    sha:fb081d5f36fe48a9f713344446081cc27c5e58b4
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:7ed36fa99ff742d543f8a8ee8068965f64b085a4
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:c2cbe4cc80e70199fd3bc294ccb581638dcb102c
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els37_all.deb
    sha:86130303f1271be12f555665b794546a334740fd
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els37_amd64.deb
    sha:6b134bdda8971982b1a2a082068cb29b53c01f61
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.