CVE-2026-34982 on CTRL-OS 24.05
Packages: vim
Status: In Progress
CVE Information
Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The
complete,guitabtooltipandprintheaderoptions are missing theP_MLEflag, allowing a modeline to be executed. Additionally, themapset()function lacks acheck_secure()call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue.
Updates
2026-04-02 00:26 CEST
Metadata changes:
- Status for package
vim: “In Progress”
2026-04-02 00:24 CEST
Metadata changes:
- Status: Plausible