Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-4715

Опубликовано: 17 мар. 2026
Источник: oracle-oval
Платформа: Oracle Linux 10

Описание

ELSA-2026-4715: vim security update (MODERATE)

[9.1.083-6.0.1.el10_1.1]

  • Remove upstream references [Orabug: 31197557]

[2:9.1.083-6.1]

  • RHEL-147922 CVE-2026-25749 vim: Heap Overflow in Vim

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

vim-X11

9.1.083-6.0.1.el10_1.1

vim-common

9.1.083-6.0.1.el10_1.1

vim-data

9.1.083-6.0.1.el10_1.1

vim-enhanced

9.1.083-6.0.1.el10_1.1

vim-filesystem

9.1.083-6.0.1.el10_1.1

vim-minimal

9.1.083-6.0.1.el10_1.1

xxd

9.1.083-6.0.1.el10_1.1

Oracle Linux x86_64

vim-X11

9.1.083-6.0.1.el10_1.1

vim-common

9.1.083-6.0.1.el10_1.1

vim-data

9.1.083-6.0.1.el10_1.1

vim-enhanced

9.1.083-6.0.1.el10_1.1

vim-filesystem

9.1.083-6.0.1.el10_1.1

vim-minimal

9.1.083-6.0.1.el10_1.1

xxd

9.1.083-6.0.1.el10_1.1

Связанные CVE

Связанные уязвимости

CVSS3: 6.6
ubuntu
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 7.3
redhat
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
nvd
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
debian
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1. ...

CVSS3: 6.6
redos
8 дней назад

Уязвимость vim