CVE-2026-25749

NameCVE-2026-25749
DescriptionVim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
vim (PTS)bullseye2:8.2.2434-3+deb11u1vulnerable
bullseye (security)2:8.2.2434-3+deb11u3vulnerable
bookworm2:9.0.1378-2+deb12u2vulnerable
trixie2:9.1.1230-2vulnerable
forky, sid2:9.1.2103-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
vimsource(unstable)(unfixed)

Notes

[trixie] - vim <no-dsa> (Minor issue)
[bookworm] - vim <no-dsa> (Minor issue)
https://github.com/vim/vim/security/advisories/GHSA-5w93-4g67-mm43
Fixed by: https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9 (v9.1.2132)

Search for package or bug name: Reporting problems