[CLSA-2026:1777389760] vim: Fix of 9 CVEs
Type:
security
Severity:
Critical
Release date:
2026-04-28 15:22:44 UTC
Description:
- CVE-2021-3903: do not set VALID_BOTLINE in w_valid when the screen is not valid, preventing invalid memory access while scrolling. - CVE-2021-4069: copy the current line before regexec in ex_open() so the match is not using freed memory when searching for a mark flushes it. - CVE-2022-0351: limit eval7() recursion to 1000 levels to prevent a stack overflow from many nested "(" in an expression. - CVE-2022-2129: disallow switching buffers in a substitute expression by extending the do_exedit() lock check to cover textlock as well. - CVE-2022-2183: avoid reading past the NUL terminator in get_lisp_indent(). - CVE-2022-2287: reject words containing control characters or a trailing slash before adding them to the internal spell word list. - CVE-2022-3234: guard PBYTE against the cursor landing past the NUL in op_replace() with virtualedit, and skip the virtualedit coladd branch when a replacement has already happened. - CVE-2022-3520: clamp b_op_end.col to zero in do_put() to prevent a negative column with Visual block put. - CVE-2022-3591: disallow navigating to a dummy buffer in do_buffer() to prevent use-after-free.
Updated packages:
  • vim-X11-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:5ebbf0bab9da24a13e96269cc0203f3effca6c16d88d42694b0f37af32c169c8
  • vim-common-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:636f0d8ba33a962a45e54b00e31ba7a268d02be21e4290776f3ff1ade690e96d
  • vim-enhanced-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:078a6bb026f7797b3ac91005869f6dc73db3940f2fe9dd69cf1316e8fe9ec029
  • vim-filesystem-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:a9f1aaddee86965b2d701f77114015e4c5a9a4bbd5dd9aebc7b04526f4321b9a
  • vim-minimal-7.4.629-8.0.1.el7_9.tuxcare.els4.x86_64.rpm
    sha:7cde9f7a673002569cbbb3f6d1517426e97381a0016e10b79f199e27302f4da0
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.