Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2026-5602

Опубликовано: 24 мар. 2026
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2026-5602: vim security update (MODERATE)

[8.2.2637-23.0.1.el9_7.1]

  • Remove upstream references [Orabug: 31197557]

[2:8.2.2637-23.1]

  • RHEL-147940 CVE-2026-25749 vim: Heap Overflow in Vim

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

vim-X11

8.2.2637-23.0.1.el9_7.1

vim-common

8.2.2637-23.0.1.el9_7.1

vim-enhanced

8.2.2637-23.0.1.el9_7.1

vim-filesystem

8.2.2637-23.0.1.el9_7.1

vim-minimal

8.2.2637-23.0.1.el9_7.1

Oracle Linux x86_64

vim-X11

8.2.2637-23.0.1.el9_7.1

vim-common

8.2.2637-23.0.1.el9_7.1

vim-enhanced

8.2.2637-23.0.1.el9_7.1

vim-filesystem

8.2.2637-23.0.1.el9_7.1

vim-minimal

8.2.2637-23.0.1.el9_7.1

Связанные CVE

Связанные уязвимости

CVSS3: 6.6
ubuntu
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 7.3
redhat
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
nvd
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
debian
около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1. ...

CVSS3: 6.6
redos
20 дней назад

Уязвимость vim