MGASA-2026-0049

Source
https://advisories.mageia.org/MGASA-2026-0049.html
Import Source
https://advisories.mageia.org/MGASA-2026-0049.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2026-0049
Related
Published
2026-03-06T03:01:36Z
Modified
2026-03-06T03:15:06.161298Z
Summary
Updated vim packages fix security vulnerabilities
Details

OS Command Injection in netrw affects Vim < 9.2.0073. (CVE-2026-28417) Heap-based Buffer Overflow in Emacs tags parsing affects Vim < 9.2.0074. (CVE-2026-28418) Heap-based Buffer Underflow in Emacs tags parsing affects Vim < 9.2.0075. (CVE-2026-28419) Heap-based Buffer Overflow and OOB Read in :terminal affects Vim < 9.2.0076. (CVE-2026-28420) Multiple Vulnerabilities in Swap File Recovery affect Vim < 9.2.0077. (CVE-2026-28421) Stack-buffer-overflow in buildstlstr_hl() affects Vim < 9.2.0078. (CVE-2026-28422)

References
Credits

Affected packages

Mageia:9 / vim

Package

Name
vim
Purl
pkg:rpm/mageia/vim?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.2.106-1.mga9

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2026-0049.json"