CVE-2026-28421

Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*

History

04 Mar 2026, 20:47

Type Values Removed Values Added
CPE cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
First Time Vim vim
Vim
References () https://github.com/vim/vim/commit/65c1a143c331c886dc28 - () https://github.com/vim/vim/commit/65c1a143c331c886dc28 - Patch
References () https://github.com/vim/vim/releases/tag/v9.2.0077 - () https://github.com/vim/vim/releases/tag/v9.2.0077 - Product
References () https://github.com/vim/vim/security/advisories/GHSA-r2gw-2x48-jj5p - () https://github.com/vim/vim/security/advisories/GHSA-r2gw-2x48-jj5p - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2026/02/27/10 - () http://www.openwall.com/lists/oss-security/2026/02/27/10 - Mailing List, Patch, Third Party Advisory
Summary
  • (es) Vim es un editor de texto de código abierto, de línea de comandos. En las versiones anteriores a la 9.2.0077, existen un desbordamiento de búfer de pila y un fallo de segmentación (SEGV) en la lógica de recuperación de archivos de intercambio de Vim. Ambos son causados por campos no validados leídos de bloques de puntero manipulados dentro de un archivo de intercambio. La versión 9.2.0077 corrige el problema.

28 Feb 2026, 01:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/02/27/10 -

27 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 22:16

Updated : 2026-03-04 20:47


NVD link : CVE-2026-28421

Mitre link : CVE-2026-28421

CVE.ORG link : CVE-2026-28421


JSON object : View

Products Affected

vim

  • vim
CWE
CWE-20

Improper Input Validation

CWE-122

Heap-based Buffer Overflow