[CLSA-2026:1778133583] vim: Fix of 10 CVEs
Type:
security
Severity:
Moderate
Release date:
2026-05-07 08:12:56 UTC
Description:
- CVE-2022-0158: fix Vim9 reading before start of line with single $ - CVE-2022-0696: fix crash when switching tabpage in cmdline window - CVE-2022-1674: fix crash when matching buffer with invalid pattern - CVE-2022-1725: fix using NULL regexp program in buffer matching - CVE-2022-1771: fix recursive command line crash by limiting getcmdline depth - CVE-2022-2208: fix crash when deleting buffers in diff mode - CVE-2022-2598: fix invalid memory access in diff mode with dp and undo - CVE-2022-2874: fix NULL pointer when skipping compiled Vim9 code - CVE-2022-2923: fix crash with mkspell on empty dictionary file - CVE-2022-2980: fix crash with mouse click when TabPageIdxs not initialized
Updated packages:
  • vim-X11-8.2.2637-22.el9_2.1.tuxcare.els23.x86_64.rpm
    sha:5c9f239405e01bdb41facc3a328f48ff85c14c68b3e3722f15360f33ef75b252
  • vim-common-8.2.2637-22.el9_2.1.tuxcare.els23.x86_64.rpm
    sha:5deddb010d0e6cbbae7a2d84f66a45a02ef455aaa3993a18d6198d5873890087
  • vim-enhanced-8.2.2637-22.el9_2.1.tuxcare.els23.x86_64.rpm
    sha:4a8be1cf7e3c7ad1130ecaa14c373c63b90e079b91d0d84d4d4126e3ae0760b7
  • vim-filesystem-8.2.2637-22.el9_2.1.tuxcare.els23.noarch.rpm
    sha:83bb7c1979284a47bdb041a302cf8f759c15f0fcbad522864ed4beb084efa3c6
  • vim-minimal-8.2.2637-22.el9_2.1.tuxcare.els23.x86_64.rpm
    sha:0a59aa2b3fbb195ee33241d92199d762e5c3d64e4b646a9e2c6d9985a55997b5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.