[CLSA-2026:1778259521] vim: Fix of 4 CVEs
Type:
security
Severity:
Moderate
Release date:
2026-05-08 16:58:46 UTC
Description:
- CVE-2022-3278: fix crash when using NUL in buffer that uses :source; don't get a next line when skipping over NL in eval_next_non_blank() (eval.c, upstream patch 9.0.0552) - CVE-2023-48234: fix overflow when getting count for normal z command; break out of nv_zet() count loop when n > LONG_MAX/10 (normal.c, upstream patch 9.0.2109) - CVE-2023-48236: fix overflow in get_number() when using z= with a large count; return 0 when n > INT_MAX/10 (misc1.c, upstream patch 9.0.2111) - CVE-2025-26603: fix use-after-free in str_to_reg() when redirecting :display to a clipboard register; skip the active redir register including the * and + clipboard fallbacks to register 0 (register.c, upstream patch 9.1.1115)
Updated packages:
  • vim-X11-8.2.2637-22.el9_2.1.tuxcare.els25.x86_64.rpm
    sha:472fd3893e4320e6289695a2a8cb0d25142039689ef95624f495b9105300a10d
  • vim-common-8.2.2637-22.el9_2.1.tuxcare.els25.x86_64.rpm
    sha:ddaf9360c5a8adb2d946dedeeebe6b557a7d484ece89dac4ca721f4327e6fc89
  • vim-enhanced-8.2.2637-22.el9_2.1.tuxcare.els25.x86_64.rpm
    sha:bea6d2564f5dbb22c2680e348e5b592c06bd85ce5b77bef392caec391382bb36
  • vim-filesystem-8.2.2637-22.el9_2.1.tuxcare.els25.noarch.rpm
    sha:b73fff40b844e2e4679d0b7d4af8d4e63082ccee5198f48566b8ece9ed87c814
  • vim-minimal-8.2.2637-22.el9_2.1.tuxcare.els25.x86_64.rpm
    sha:9b7294c643d7bb8f2cfb8274cbee8d045c551c2713c33161d8f6cb22b9868508
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.