UBUNTU-CVE-2026-32249

Source
https://ubuntu.com/security/CVE-2026-32249
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-32249.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-32249
Upstream
Downstream
Related
Published
2026-03-12T20:16:00Z
Modified
2026-04-16T10:59:44.236356Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Vim is an open source, command line text editor. From 9.1.0011 to before 9.2.0137, Vim's NFA regex compiler, when encountering a collection containing a combining character as the endpoint of a character range (e.g. [0-0\u05bb]), incorrectly emits the composing bytes of that character as separate NFA states. This corrupts the NFA postfix stack, resulting in NFASTARTCOLL having a NULL out1 pointer. When nfamaxwidth() subsequently traverses the compiled NFA to estimate match width for the look-behind assertion, it dereferences state->out1->out without a NULL check, causing a segmentation fault. This vulnerability is fixed in 9.2.0137.

References

Affected packages

Ubuntu:24.04:LTS / vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:9.1.0016-1ubuntu7.11?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.1.0016-1ubuntu7.11

Affected versions

2:9.*
2:9.0.1672-1ubuntu2
2:9.0.2087-1ubuntu1
2:9.0.2116-1ubuntu1
2:9.0.2116-1ubuntu2
2:9.0.2184-0ubuntu1
2:9.0.2189-1ubuntu1
2:9.1.0-1ubuntu1
2:9.1.0016-1ubuntu2
2:9.1.0016-1ubuntu6
2:9.1.0016-1ubuntu7
2:9.1.0016-1ubuntu7.1
2:9.1.0016-1ubuntu7.2
2:9.1.0016-1ubuntu7.3
2:9.1.0016-1ubuntu7.4
2:9.1.0016-1ubuntu7.5
2:9.1.0016-1ubuntu7.6
2:9.1.0016-1ubuntu7.7
2:9.1.0016-1ubuntu7.8
2:9.1.0016-1ubuntu7.9
2:9.1.0016-1ubuntu7.10

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "vim-gtk3",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "vim-motif",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        },
        {
            "binary_name": "xxd",
            "binary_version": "2:9.1.0016-1ubuntu7.11"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-32249.json"

Ubuntu:25.10 / vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:9.1.0967-1ubuntu6.2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.1.0967-1ubuntu6.2

Affected versions

2:9.*
2:9.1.0967-1ubuntu4
2:9.1.0967-1ubuntu5
2:9.1.0967-1ubuntu6
2:9.1.0967-1ubuntu6.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "vim-gtk3",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "vim-motif",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        },
        {
            "binary_name": "xxd",
            "binary_version": "2:9.1.0967-1ubuntu6.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-32249.json"