[CLSA-2026:1774344754] vim: Fix of 2 CVEs
Type:
security
Severity:
Important
Release date:
2026-03-24 09:32:38 UTC
Description:
- CVE-2026-28417: fix OS command injection in netrw plugin via crafted scp:// URIs by adding strict RFC1123 hostname validation and using shellescape() for hostname and port values. - CVE-2026-28421: fix heap-buffer-overflow and SEGV in swap file recovery by adding bounds checks on pe_page_count, pe_bnum, pe_old_lnum and pe_line_count before descending into the block tree.
Updated packages:
  • vim-X11-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm
    sha:a6a17df9e92d2d5b937aefde98f9f1a75be659bd0bdeb990fdba8863cab5220b
  • vim-common-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm
    sha:dc869f9f3ab31957c1c55ed76dbb26aad749189738ef23741cd61ac029487b4d
  • vim-enhanced-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm
    sha:5493113daff8f05a92851842ac38c382d39ed40c15e788e217740ead32dce96a
  • vim-filesystem-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm
    sha:dcceb6cd9a5c02833b2a6556d0a03e30e635f65d495e7407b3f1289c17398522
  • vim-minimal-7.4.629-8.0.1.el7_9.tuxcare.els3.x86_64.rpm
    sha:2b67e3b555e1c36662eed3097853d0ad0236b26b97ea11b0a8af477f3fda3fa8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.