Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-28422

Опубликовано: 27 фев. 2026
Источник: debian
EPSS Низкий

Описание

Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow occurs in `build_stl_str_hl()` when rendering a statusline with a multi-byte fill character on a very wide terminal. Version 9.2.0078 patches the issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vimfixed2:9.2.0119-1package

Примечания

  • https://github.com/vim/vim/security/advisories/GHSA-gmqx-prf2-8mwf

  • Fixed by: https://github.com/vim/vim/commit/4e5b9e31cb7484ad156fba995fdce3c9b075b5fd (v9.2.0078)

  • Crash in CLI tool, no security impact

EPSS

Процентиль: 0%
0.00005
Низкий

Связанные уязвимости

CVSS3: 2.2
ubuntu
27 дней назад

Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow occurs in `build_stl_str_hl()` when rendering a statusline with a multi-byte fill character on a very wide terminal. Version 9.2.0078 patches the issue.

CVSS3: 2.2
redhat
27 дней назад

Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow occurs in `build_stl_str_hl()` when rendering a statusline with a multi-byte fill character on a very wide terminal. Version 9.2.0078 patches the issue.

CVSS3: 2.2
nvd
27 дней назад

Vim is an open source, command line text editor. Prior to version 9.2.0078, a stack-buffer-overflow occurs in `build_stl_str_hl()` when rendering a statusline with a multi-byte fill character on a very wide terminal. Version 9.2.0078 patches the issue.

CVSS3: 2.2
msrc
26 дней назад

Vim has stack-buffer-overflow in build_stl_str_hl()

CVSS3: 2.2
fstec
28 дней назад

Уязвимость текстового редактора vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 0%
0.00005
Низкий