Release date:
2026-05-06 11:51:30 UTC
Description:
- CVE-2026-26269: stack buffer overflow in netbeans special_keys()
- CVE-2026-28417: OS command injection via crafted netrw URL
- CVE-2026-28421: heap-buffer-overflow / SEGV in swap file recovery
- CVE-2026-33412: command injection in glob() via shell newline
- CVE-2026-39881: OS command injection in netbeans defineAnnoType
Updated packages:
-
vim-X11-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
sha:49bc6f03039dc13c87526f1292c55ea625f18599d68522b4dcebddc3e264bc9a
-
vim-common-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
sha:9cb28ccfc49e0ef527705138aac6881d1d30331b1fe65a78ab61cc7e4a41268c
-
vim-data-9.0.2153-1.amzn2.0.5.tuxcare.els1.noarch.rpm
sha:41606cbde3a45c2f37be5a289a301b2d37e01466f4ea3f86d1127238a563039f
-
vim-enhanced-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
sha:35ed6c853b7bb8780b493d36ffaed4052460be3b2decd6deb6ceb1d9d5108dba
-
vim-filesystem-9.0.2153-1.amzn2.0.5.tuxcare.els1.noarch.rpm
sha:3f6218f19b07e041320f6c2cd47098ceedf9a41328b086febef0bacf66b7f6d4
-
vim-minimal-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
sha:0bdcb44471c0ec0ffe67ccd5608896491bec03b7a760d1f15472e1f4627bdf3d
-
xxd-9.0.2153-1.amzn2.0.5.tuxcare.els1.x86_64.rpm
sha:4139b11b649fa46a69c7fe3babca629753cb7a8a289cf4691277a702f2e1dfb9
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.