Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-4442

Опубликовано: 12 мар. 2026
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2026-4442: vim security update (MODERATE)

[8.0.1763-22.0.1]

  • Remove upstream references [Orabug: 31197557]
  • Added glibc-gconv-extra to common requires to provide ISO-8859-2 [Orabug: 34114984]

[2:8.0.1763-22]

  • RHEL-147935 CVE-2026-25749 vim: Heap Overflow in Vim

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

vim-X11

8.0.1763-22.0.1.el8_10

vim-common

8.0.1763-22.0.1.el8_10

vim-enhanced

8.0.1763-22.0.1.el8_10

vim-filesystem

8.0.1763-22.0.1.el8_10

vim-minimal

8.0.1763-22.0.1.el8_10

Oracle Linux x86_64

vim-X11

8.0.1763-22.0.1.el8_10

vim-common

8.0.1763-22.0.1.el8_10

vim-enhanced

8.0.1763-22.0.1.el8_10

vim-filesystem

8.0.1763-22.0.1.el8_10

vim-minimal

8.0.1763-22.0.1.el8_10

Связанные CVE

Связанные уязвимости

CVSS3: 6.6
ubuntu
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 7.3
redhat
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
nvd
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
debian
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1. ...

CVSS3: 6.6
redos
8 дней назад

Уязвимость vim