[CLSA-2023:1685380447] Fix CVE(s): CVE-2023-2610
Type:
security
Severity:
Important
Release date:
2023-05-29 17:14:12 UTC
Description:
* SECURITY UPDATE: Crash when expanding "~" in substitute causes very long text - debian/patches/CVE-2023-2610.patch: Limit the text length to MAXCOL - CVE-2023-2610
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:bcc0786dedbbe049e7d52a9c135f25f2faec9a3e
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:14e606c9f3069c2e8bf0d81de68c572e6b8753ce
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:d28c63eddc5b12cc6667343c31e11176f4ef0385
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:4bd55dab09903f3de908f4c097889be365dc02cb
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els42_all.deb
    sha:630f30852a1be35021d90e4cd1039f96007b1f46
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:8f411e658f7decb661dad3cca09a3b132a218a6b
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:713dd893f2a546015b8b2e47ce8b05a52847b052
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:998331c0f47db324d880a31780ffdafc7ffeead5
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:d7f509642ba2d3dc84185cfbe53888ef54681028
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:acfa0e1945038fee31965e5d4523059ebaaf9584
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:fc7e651127db22fd1a0c33b32a4800c488d2e7a2
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els42_all.deb
    sha:3cfb46cbe4426450821eafe3d46810edb8e7db9b
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:f142be3519b046ed5e47c6980ac604df1d819911
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:69e6a4547539d30bd3abf2ef6081a6a35568971b
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els42_all.deb
    sha:0b11b58d671afd8a15d44911693630878d4ddbf6
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els42_amd64.deb
    sha:32f7fdb59b48d2d8de7c730fa919593baefa4041
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.