{"schema_version":"1.7.2","id":"OESA-2026-1497","modified":"2026-03-06T12:41:24Z","published":"2026-03-06T12:41:24Z","upstream":["CVE-2026-26269"],"summary":"vim security update","details":"Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor &amp;apos;Vi&amp;apos;, with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.\r\n\r\nSecurity Fix(es):\n\nVim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim&apos;s NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.(CVE-2026-26269)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"vim","purl":"pkg:rpm/openEuler/vim&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0-39.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["vim-X11-9.0-39.oe2203sp4.aarch64.rpm","vim-common-9.0-39.oe2203sp4.aarch64.rpm","vim-debuginfo-9.0-39.oe2203sp4.aarch64.rpm","vim-debugsource-9.0-39.oe2203sp4.aarch64.rpm","vim-enhanced-9.0-39.oe2203sp4.aarch64.rpm","vim-minimal-9.0-39.oe2203sp4.aarch64.rpm"],"noarch":["vim-filesystem-9.0-39.oe2203sp4.noarch.rpm"],"src":["vim-9.0-39.oe2203sp4.src.rpm"],"x86_64":["vim-X11-9.0-39.oe2203sp4.x86_64.rpm","vim-common-9.0-39.oe2203sp4.x86_64.rpm","vim-debuginfo-9.0-39.oe2203sp4.x86_64.rpm","vim-debugsource-9.0-39.oe2203sp4.x86_64.rpm","vim-enhanced-9.0-39.oe2203sp4.x86_64.rpm","vim-minimal-9.0-39.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1497"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-26269"}],"database_specific":{"severity":"High"}}
