[CLSA-2026:1778068286] vim: Fix of 5 CVEs
Type:
security
Severity:
Important
Release date:
2026-05-06 11:51:30 UTC
Description:
- CVE-2026-26269: stack buffer overflow in netbeans special_keys() - CVE-2026-28417: OS command injection via crafted netrw URL - CVE-2026-28421: heap-buffer-overflow / SEGV in swap file recovery - CVE-2026-33412: command injection in glob() via shell newline - CVE-2026-39881: OS command injection in netbeans defineAnnoType
Updated packages:
  • vim-X11-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
    sha:49bc6f03039dc13c87526f1292c55ea625f18599d68522b4dcebddc3e264bc9a
  • vim-common-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
    sha:9cb28ccfc49e0ef527705138aac6881d1d30331b1fe65a78ab61cc7e4a41268c
  • vim-data-9.0.2153-1.amzn2.0.5.tuxcare.els1.noarch.rpm
    sha:41606cbde3a45c2f37be5a289a301b2d37e01466f4ea3f86d1127238a563039f
  • vim-enhanced-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
    sha:35ed6c853b7bb8780b493d36ffaed4052460be3b2decd6deb6ceb1d9d5108dba
  • vim-filesystem-9.0.2153-1.amzn2.0.5.tuxcare.els1.noarch.rpm
    sha:3f6218f19b07e041320f6c2cd47098ceedf9a41328b086febef0bacf66b7f6d4
  • vim-minimal-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
    sha:0bdcb44471c0ec0ffe67ccd5608896491bec03b7a760d1f15472e1f4627bdf3d
  • xxd-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
    sha:4139b11b649fa46a69c7fe3babca629753cb7a8a289cf4691277a702f2e1dfb9
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.