[ubuntu/resolute-proposed] vim 2:9.1.2141-1ubuntu2 (Accepted)

Bruce Cable bruce.cable at canonical.com
Tue Mar 17 12:54:16 UTC 2026


vim (2:9.1.2141-1ubuntu2) resolute; urgency=medium

  * SECURITY UPDATE: Buffer Overflow
    - debian/patches/CVE-2026-26269.patch: Limit writing to max KEYBUFLEN
      bytes to prevent writing out of bounds.
    - debian/patches/CVE-2026-28420.patch: Use VTERM_MAX_CHARS_PER_CELL * 4
      for ga_grow() to ensure sufficient space. Add a boundary check to the
      character loop to prevent index out-of-bounds access.
    - debian/patches/CVE-2026-28422.patch: Update the size check to account
      for the byte length of the fill character (using MB_CHAR2LEN).
    - CVE-2026-26269
    - CVE-2026-28420
    - CVE-2026-28422
  * SECURITY UPDATE: Command Injection
    - debian/patches/CVE-2026-28417.patch: Implement stricter RFC1123
      hostname and IP validation. Use shellescape() for the provided
      hostname and port.
    - debian/patches/fix-test_plugin_netrw-tests.patch: Add missing
      function TestNetrwCaptureRemotePath
    - CVE-2026-28417
  * SECURITY UPDATE: Out of Bounds Read
    - debian/patches/CVE-2026-28418.patch: Check for end of buffer
      and return early.
    - CVE-2026-28418
  * SECURITY UPDATE: Buffer Underflow
    - debian/patches/CVE-2026-28419.patch: Add a check to ensure the
      delimiter (p_7f) is not at the start of the buffer (lbuf) before
      attempting to isolate the tag name.
    - CVE-2026-28419
  * SECURITY UPDATE: Denial of Service
    - debian/patches/CVE-2026-28421.patch: Add bounds checks on
      pe_page_count and pe_bnum against mf_blocknr_max before descending
      into the block tree, and validate pe_old_lnum >= 1 and
      pe_line_count > 0 before calling readfile().
    - CVE-2026-28421

Date: Tue, 10 Mar 2026 19:44:16 +1100
Changed-By: Bruce Cable <bruce.cable at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/vim/2:9.1.2141-1ubuntu2
-------------- next part --------------
Format: 1.8
Date: Tue, 10 Mar 2026 19:44:16 +1100
Source: vim
Built-For-Profiles: derivative.ubuntu noudeb
Architecture: source
Version: 2:9.1.2141-1ubuntu2
Distribution: resolute
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Bruce Cable <bruce.cable at canonical.com>
Changes:
 vim (2:9.1.2141-1ubuntu2) resolute; urgency=medium
 .
   * SECURITY UPDATE: Buffer Overflow
     - debian/patches/CVE-2026-26269.patch: Limit writing to max KEYBUFLEN
       bytes to prevent writing out of bounds.
     - debian/patches/CVE-2026-28420.patch: Use VTERM_MAX_CHARS_PER_CELL * 4
       for ga_grow() to ensure sufficient space. Add a boundary check to the
       character loop to prevent index out-of-bounds access.
     - debian/patches/CVE-2026-28422.patch: Update the size check to account
       for the byte length of the fill character (using MB_CHAR2LEN).
     - CVE-2026-26269
     - CVE-2026-28420
     - CVE-2026-28422
   * SECURITY UPDATE: Command Injection
     - debian/patches/CVE-2026-28417.patch: Implement stricter RFC1123
       hostname and IP validation. Use shellescape() for the provided
       hostname and port.
     - debian/patches/fix-test_plugin_netrw-tests.patch: Add missing
       function TestNetrwCaptureRemotePath
     - CVE-2026-28417
   * SECURITY UPDATE: Out of Bounds Read
     - debian/patches/CVE-2026-28418.patch: Check for end of buffer
       and return early.
     - CVE-2026-28418
   * SECURITY UPDATE: Buffer Underflow
     - debian/patches/CVE-2026-28419.patch: Add a check to ensure the
       delimiter (p_7f) is not at the start of the buffer (lbuf) before
       attempting to isolate the tag name.
     - CVE-2026-28419
   * SECURITY UPDATE: Denial of Service
     - debian/patches/CVE-2026-28421.patch: Add bounds checks on
       pe_page_count and pe_bnum against mf_blocknr_max before descending
       into the block tree, and validate pe_old_lnum >= 1 and
       pe_line_count > 0 before calling readfile().
     - CVE-2026-28421
Checksums-Sha1:
 4756438c678d1443ffe15dffb4faf1fa1156295c 3037 vim_9.1.2141-1ubuntu2.dsc
 a642736dd2d2714c4c60535e158cc49a7fdae9a9 214660 vim_9.1.2141-1ubuntu2.debian.tar.xz
 6cf0cfaf3d101452fa43e6eb7917d8e0587b142f 17256 vim_9.1.2141-1ubuntu2_source.buildinfo
Checksums-Sha256:
 3e0a3b0b7c3cba17e5fae8e410a20f492952d141ba7023cde3fb8962a5e91018 3037 vim_9.1.2141-1ubuntu2.dsc
 d3aea84fa8443cb51d16249836d46d536902f7f5ba2e9d4619d3f710b7c92755 214660 vim_9.1.2141-1ubuntu2.debian.tar.xz
 6b255b05976edb763fe51be062a524f03d027ef3e9d77a090f5dbcbb4e794bcd 17256 vim_9.1.2141-1ubuntu2_source.buildinfo
Files:
 ab3602eb2333e0d7d86175aaf9e2a35c 3037 editors optional vim_9.1.2141-1ubuntu2.dsc
 e3bfd87be5a338fc9659410425e57e6b 214660 editors optional vim_9.1.2141-1ubuntu2.debian.tar.xz
 5b8fad00638255c096ded000e237e2e0 17256 editors optional vim_9.1.2141-1ubuntu2_source.buildinfo
Original-Maintainer: Debian Vim Maintainers <team+vim at tracker.debian.org>


More information about the Resolute-changes mailing list