{"schema_version":"1.7.2","id":"OESA-2026-2004","modified":"2026-04-25T05:47:58Z","published":"2026-04-25T05:47:58Z","upstream":["CVE-2026-39881"],"summary":"vim security update","details":"Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor &amp;apos;Vi&amp;apos;, with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.\r\n\r\nSecurity Fix(es):\n\nVim is an open source, command line text editor. Prior to 9.2.0316, a command injection vulnerability in Vim&apos;s netbeans interface allows a malicious netbeans server to execute arbitrary Ex commands when Vim connects to it, via unsanitized strings in the defineAnnoType and specialKeys protocol messages. This vulnerability is fixed in 9.2.0316.(CVE-2026-39881)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"vim","purl":"pkg:rpm/openEuler/vim&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0-44.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["vim-X11-9.0-44.oe2203sp4.aarch64.rpm","vim-common-9.0-44.oe2203sp4.aarch64.rpm","vim-debuginfo-9.0-44.oe2203sp4.aarch64.rpm","vim-debugsource-9.0-44.oe2203sp4.aarch64.rpm","vim-enhanced-9.0-44.oe2203sp4.aarch64.rpm","vim-minimal-9.0-44.oe2203sp4.aarch64.rpm"],"noarch":["vim-filesystem-9.0-44.oe2203sp4.noarch.rpm"],"src":["vim-9.0-44.oe2203sp4.src.rpm"],"x86_64":["vim-X11-9.0-44.oe2203sp4.x86_64.rpm","vim-common-9.0-44.oe2203sp4.x86_64.rpm","vim-debuginfo-9.0-44.oe2203sp4.x86_64.rpm","vim-debugsource-9.0-44.oe2203sp4.x86_64.rpm","vim-enhanced-9.0-44.oe2203sp4.x86_64.rpm","vim-minimal-9.0-44.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-39881"}],"database_specific":{"severity":"Medium"}}
