[CLSA-2026:1777444367] vim: Fix of 9 CVEs
Type:
security
Severity:
Critical
Release date:
2026-04-29 06:59:23 UTC
Description:
- CVE-2021-3903: do not set VALID_BOTLINE in w_valid when the screen is not valid, preventing invalid memory access while scrolling. - CVE-2021-4069: copy the current line before regexec in ex_open() so the match is not using freed memory when searching for a mark flushes it. - CVE-2022-0351: limit eval7() recursion to 1000 levels to prevent a stack overflow from many nested "(" in an expression. - CVE-2022-2129: disallow switching buffers in a substitute expression by extending the do_exedit() lock check to cover textlock as well. - CVE-2022-2183: avoid reading past the NUL terminator in get_lisp_indent(). - CVE-2022-2287: reject words containing control characters or a trailing slash before adding them to the internal spell word list. - CVE-2022-3234: guard PBYTE against the cursor landing past the NUL in op_replace() with virtualedit, and skip the virtualedit coladd branch when a replacement has already happened. - CVE-2022-3520: clamp b_op_end.col to zero in do_put() to prevent a negative column with Visual block put. - CVE-2022-3591: disallow navigating to a dummy buffer in do_buffer() to prevent use-after-free.
Updated packages:
  • vim-X11-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:49ab3590f920d7f01492c825599e86a5716e77b937418f5bbae2f99e2baf5874
  • vim-common-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:b890b27bc08ed9f73bb08c082531b327803f299fd23a2869b81e941d1fc85a76
  • vim-enhanced-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:0d011134e5e02953af2ced12854679ee3ade4b3138ce0fb2e1f16483bda939b1
  • vim-filesystem-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:e49e128e3a2089384713345d01b3a09e16000d2fddb12b306e74d7c4c2a7c639
  • vim-minimal-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:60e8c51d5fb87f6d687385949f5d92ebc1c46622e5b618ca0550eabb95c26108
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.