DEBIAN-CVE-2026-34714

Source
https://security-tracker.debian.org/tracker/CVE-2026-34714
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34714.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-34714
Upstream
  • CVE-2026-34714
Published
2026-03-30T19:16:26.853Z
Modified
2026-04-03T10:03:17.986706Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.

References

Affected packages

Debian:14 / vim

Package

Name
vim
Purl
pkg:deb/debian/vim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:9.*
2:9.1.1230-2
2:9.1.1385-1
2:9.1.1766-1
2:9.1.1829-1
2:9.1.1846-1
2:9.1.1882-1
2:9.1.2103-1
2:9.1.2141-1
2:9.2.0119-1
2:9.2.0136-1
2:9.2.0218-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-34714.json"