Source: vim Version: 2:9.1.2141-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for vim. CVE-2026-28418[0]: | Vim is an open source, command line text editor. Prior to version | 9.2.0074, a heap-based buffer overflow out-of-bounds read exists in | Vim's Emacs-style tags file parsing logic. When processing a | malformed tags file, Vim can be tricked into reading up to 7 bytes | beyond the allocated memory boundary. Version 9.2.0074 fixes the | issue. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-28418 https://www.cve.org/CVERecord?id=CVE-2026-28418 [1] https://github.com/vim/vim/security/advisories/GHSA-h4mf-vg97-hj8j [2] https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d Please adjust the affected versions in the BTS as needed. Regards, Salvatore

