[CLSA-2026:1778611387] vim: Fix of 3 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-12 18:43:13 UTC
Description:
- CVE-2022-2257: fix out-of-bounds read in str2special() when advancing past the trailing NUL of a menu item with only a modifier (message.c, upstream patch 9.0.0009) - CVE-2022-2182: fix heap buffer overflow in parse_cmd_address() when address line 0 is used with the ";" separator (":0;/PATTERN/"); clamp cursor column via check_cursor_col() for line 0 (ex_docmd.c, upstream patch 8.2.5150) - CVE-2022-2849: return zero byte length for NUL in latin_ptr2len() and dbcs_ptr2len() so iterating past the end of a null string cannot dereference an invalid address (mbyte.c, upstream patch 9.0.0220; minimal form — only the functional changes backported)
Updated packages:
  • vim-X11-8.2.2637-22.el9_2.1.tuxcare.els26.x86_64.rpm
    sha:f8ae615c735b70e9d435524fabf04d5028840bab79128007178cf8b05d96a739
  • vim-common-8.2.2637-22.el9_2.1.tuxcare.els26.x86_64.rpm
    sha:2f2a876da98413617387bf42a62010348b6905467c825b9621351e55f6926867
  • vim-enhanced-8.2.2637-22.el9_2.1.tuxcare.els26.x86_64.rpm
    sha:dfdbcaa2bb224d78b2db8d5ab672f22b8dd2fb0a08c67c573ae6348fd49944b1
  • vim-filesystem-8.2.2637-22.el9_2.1.tuxcare.els26.noarch.rpm
    sha:a5ca97c0ca3c32290066b2d7ab486456c2459b160d00d9beb1abc354fee96a8b
  • vim-minimal-8.2.2637-22.el9_2.1.tuxcare.els26.x86_64.rpm
    sha:fe981eef97b24cd08c9831eb3c8f7ab4494e976f823a56b6cdce43fe7faa152e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.