Описание
ELSA-2026-4715: vim security update (MODERATE)
[9.1.083-6.0.1.el10_1.1]
- Remove upstream references [Orabug: 31197557]
[2:9.1.083-6.1]
- RHEL-147922 CVE-2026-25749 vim: Heap Overflow in Vim
Обновленные пакеты
Oracle Linux 10
Oracle Linux aarch64
vim-X11
9.1.083-6.0.1.el10_1.1
vim-common
9.1.083-6.0.1.el10_1.1
vim-data
9.1.083-6.0.1.el10_1.1
vim-enhanced
9.1.083-6.0.1.el10_1.1
vim-filesystem
9.1.083-6.0.1.el10_1.1
vim-minimal
9.1.083-6.0.1.el10_1.1
xxd
9.1.083-6.0.1.el10_1.1
Oracle Linux x86_64
vim-X11
9.1.083-6.0.1.el10_1.1
vim-common
9.1.083-6.0.1.el10_1.1
vim-data
9.1.083-6.0.1.el10_1.1
vim-enhanced
9.1.083-6.0.1.el10_1.1
vim-filesystem
9.1.083-6.0.1.el10_1.1
vim-minimal
9.1.083-6.0.1.el10_1.1
xxd
9.1.083-6.0.1.el10_1.1
Связанные CVE
Связанные уязвимости
Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.
Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.
Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.
Vim is an open source, command line text editor. Prior to version 9.1. ...