[CLSA-2026:1774017921] Fix CVE(s): CVE-2026-25749
Type:
security
Severity:
Important
Release date:
2026-03-20 14:45:27 UTC
Description:
* SECURITY UPDATE: Heap buffer overflow in helpfile option handling - debian/patches/CVE-2026-25749.patch: use vim_strncpy with MAXPATHL bound instead of unbounded STRCPY in get_tagfname() - CVE-2026-25749
Updated packages:
  • vim_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:fb8a03c614acb45d5951dda044af975485fe46b8
  • vim-athena_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:cae664356c788da6974ac280764f29a083b4b7da
  • vim-athena-py2_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:cceee30823408e0f5ec2d83494ec0e8164424217
  • vim-common_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:058d7283cc93c5b6d9cca14bedc38d1de6fc7a05
  • vim-doc_7.4.1689-3ubuntu1.5+tuxcare.els61_all.deb
    sha:06a977eba3e203d08f62e426a91684848ce02d8a
  • vim-gnome_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:3f08f08bd4569d3cc0fc3f80a66a075626d30161
  • vim-gnome-py2_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:84426c93e35231e79a7d76246a267b40fd798227
  • vim-gtk_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:521c04170f0be3b782878036170a9f91e1ee7fbd
  • vim-gtk-py2_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:aa5ac49eeb862bafe2a409d44efcece492d92cdd
  • vim-gtk3_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:40f510840f77716f577bf6f247652d7c317490c8
  • vim-gtk3-py2_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:8058c680b42c65f7f1c9c89322e01803679b061d
  • vim-gui-common_7.4.1689-3ubuntu1.5+tuxcare.els61_all.deb
    sha:3d148ebf513652b0a8e1fada02464fae29ac1c06
  • vim-nox_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:238100235c18aa1e16f1ab791dec7c950a054d69
  • vim-nox-py2_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:cf84bc3be46784f5d25a0ed4b617d722ca30ba70
  • vim-runtime_7.4.1689-3ubuntu1.5+tuxcare.els61_all.deb
    sha:0f6826b3c71e561b0977cc064ff78fc69ab4a0f2
  • vim-tiny_7.4.1689-3ubuntu1.5+tuxcare.els61_amd64.deb
    sha:e92f93b83470c73680c2f6e14f9a179e516864fe
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.