{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Bump version",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/tuxcare9.6esu/advisories/2026/clsa-2026_1767617422.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
      }
    ],
    "tracking": {
      "current_release_date": "2026-01-05T12:52:57Z",
      "generator": {
        "date": "2026-01-05T12:52:57Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1767617422",
      "initial_release_date": "2026-01-05T12:52:57Z",
      "revision_history": [
        {
          "date": "2026-01-05T12:52:57Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Update of vim"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.6",
                "product": {
                  "name": "AlmaLinux 9.6",
                  "product_id": "AlmaLinux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Rocky Linux 9.6",
                "product": {
                  "name": "Rocky Linux 9.6",
                  "product_id": "Rocky Linux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:resf:rocky_linux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Rocky Linux"
          }
        ],
        "category": "vendor",
        "name": "Rocky Linux"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                "product": {
                  "name": "vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                  "product_id": "vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/vim-enhanced@8.2.2637-22.el9_6.1.tuxcare.els1?arch=x86_64&epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                "product": {
                  "name": "vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                  "product_id": "vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/vim-common@8.2.2637-22.el9_6.1.tuxcare.els1?arch=x86_64&epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                "product": {
                  "name": "vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                  "product_id": "vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/vim-minimal@8.2.2637-22.el9_6.1.tuxcare.els1?arch=x86_64&epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                "product": {
                  "name": "vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                  "product_id": "vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/vim-X11@8.2.2637-22.el9_6.1.tuxcare.els1?arch=x86_64&epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
                "product": {
                  "name": "vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
                  "product_id": "vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/vim-filesystem@8.2.2637-22.el9_6.1.tuxcare.els1?arch=noarch&epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        },
        "product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        },
        "product_reference": "vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        },
        "product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch"
        },
        "product_reference": "vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        },
        "product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        },
        "product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        },
        "product_reference": "vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        },
        "product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch"
        },
        "product_reference": "vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        },
        "product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-4750",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "Use After Free in GitHub repository vim/vim prior to 9.0.1857.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4750"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Oct/24",
          "url": "http://seclists.org/fulldisclosure/2023/Oct/24"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed",
          "url": "https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea",
          "url": "https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213984",
          "url": "https://support.apple.com/kb/HT213984"
        }
      ],
      "release_date": "2023-09-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-4751",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4751"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Oct/24",
          "url": "http://seclists.org/fulldisclosure/2023/Oct/24"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b",
          "url": "https://github.com/vim/vim/commit/e1121b139480f53d1b06f84f3e4574048108fa0b"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378",
          "url": "https://huntr.dev/bounties/db7be8d6-6cb7-4ae5-9c4e-805423afa378"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213984",
          "url": "https://support.apple.com/kb/HT213984"
        }
      ],
      "release_date": "2023-09-03T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-0433",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-0433"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Mar/17",
          "url": "http://seclists.org/fulldisclosure/2023/Mar/17"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Mar/18",
          "url": "http://seclists.org/fulldisclosure/2023/Mar/18"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Mar/21",
          "url": "http://seclists.org/fulldisclosure/2023/Mar/21"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b",
          "url": "https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e",
          "url": "https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213670",
          "url": "https://support.apple.com/kb/HT213670"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213675",
          "url": "https://support.apple.com/kb/HT213675"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213677",
          "url": "https://support.apple.com/kb/HT213677"
        }
      ],
      "release_date": "2023-01-21T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-0288",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1189.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-0288"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Mar/17",
          "url": "http://seclists.org/fulldisclosure/2023/Mar/17"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a",
          "url": "https://github.com/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3",
          "url": "https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213670",
          "url": "https://support.apple.com/kb/HT213670"
        }
      ],
      "release_date": "2023-01-13T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-0049",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-0049"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Mar/17",
          "url": "http://seclists.org/fulldisclosure/2023/Mar/17"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c",
          "url": "https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9",
          "url": "https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T33LLWHLH63XDCO5OME7NWN63RA4U5HF/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T33LLWHLH63XDCO5OME7NWN63RA4U5HF/"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/202305-16",
          "url": "https://security.gentoo.org/glsa/202305-16"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213670",
          "url": "https://support.apple.com/kb/HT213670"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20250117-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20250117-0005/"
        }
      ],
      "release_date": "2023-01-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-29768",
      "cwe": {
        "id": "CWE-88",
        "name": "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files in versions prior to 9.1.1198. The impact is medium because a user must be made to view such an archive with Vim and then press 'x' on such a strange filename. The issue has been fixed as of Vim patch v9.1.1198.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-29768"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/f209dcd3defb95bae21b2740910e6aa7bb940531",
          "url": "https://github.com/vim/vim/commit/f209dcd3defb95bae21b2740910e6aa7bb940531"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf",
          "url": "https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20250502-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20250502-0001/"
        }
      ],
      "release_date": "2025-03-13T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-53905",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-53905"
        }
      ],
      "release_date": "2025-07-15T20:48:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-2610",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-2610"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a",
          "url": "https://github.com/vim/vim/commit/ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d",
          "url": "https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213844",
          "url": "https://support.apple.com/kb/HT213844"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213845",
          "url": "https://support.apple.com/kb/HT213845"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20241129-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20241129-0006/"
        }
      ],
      "release_date": "2023-05-09T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-22667",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-22667"
        },
        {
          "category": "external",
          "summary": "https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt",
          "url": "https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47",
          "url": "https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240223-0008/",
          "url": "https://security.netapp.com/advisory/ntap-20240223-0008/"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/"
        }
      ],
      "release_date": "2024-02-05T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-0054",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1145.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-0054"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Mar/17",
          "url": "http://seclists.org/fulldisclosure/2023/Mar/17"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/3ac1d97a1d9353490493d30088256360435f7731",
          "url": "https://github.com/vim/vim/commit/3ac1d97a1d9353490493d30088256360435f7731"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d",
          "url": "https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/202305-16",
          "url": "https://security.gentoo.org/glsa/202305-16"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213670",
          "url": "https://support.apple.com/kb/HT213670"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html"
        }
      ],
      "release_date": "2023-01-04T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-5535",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "Use After Free in GitHub repository vim/vim prior to v9.0.2010.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-5535"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d",
          "url": "https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f",
          "url": "https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/"
        }
      ],
      "release_date": "2023-10-11T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-4781",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4781"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Oct/24",
          "url": "http://seclists.org/fulldisclosure/2023/Oct/24"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93",
          "url": "https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883",
          "url": "https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/09/msg00035.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00035.html"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213984",
          "url": "https://support.apple.com/kb/HT213984"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html"
        }
      ],
      "release_date": "2023-09-05T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-3903",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "vim is vulnerable to Heap-based Buffer Overflow",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3903"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/01/15/1",
          "url": "http://www.openwall.com/lists/oss-security/2022/01/15/1"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43",
          "url": "https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8",
          "url": "https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/"
        }
      ],
      "release_date": "2021-10-27T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-4752",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "Use After Free in GitHub repository vim/vim prior to 9.0.1858.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4752"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Oct/24",
          "url": "http://seclists.org/fulldisclosure/2023/Oct/24"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139",
          "url": "https://github.com/vim/vim/commit/ee9166eb3b41846661a39b662dc7ebe8b5e15139"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757",
          "url": "https://huntr.dev/bounties/85f62dd7-ed84-4fa2-b265-8a369a318757"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/09/msg00035.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00035.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213984",
          "url": "https://support.apple.com/kb/HT213984"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html"
        }
      ],
      "release_date": "2023-09-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-4734",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4734"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Oct/24",
          "url": "http://seclists.org/fulldisclosure/2023/Oct/24"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/4c6fe2e2ea62469642ed1d80b16d39e616b25cf5",
          "url": "https://github.com/vim/vim/commit/4c6fe2e2ea62469642ed1d80b16d39e616b25cf5"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/688e4382-d2b6-439a-a54e-484780f82217",
          "url": "https://huntr.dev/bounties/688e4382-d2b6-439a-a54e-484780f82217"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213984",
          "url": "https://support.apple.com/kb/HT213984"
        }
      ],
      "release_date": "2023-09-02T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-4735",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4735"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Oct/24",
          "url": "http://seclists.org/fulldisclosure/2023/Oct/24"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/889f6af37164775192e33b233a90e86fd3df0f57",
          "url": "https://github.com/vim/vim/commit/889f6af37164775192e33b233a90e86fd3df0f57"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/fc83bde3-f621-42bd-aecb-8c1ae44cba51",
          "url": "https://huntr.dev/bounties/fc83bde3-f621-42bd-aecb-8c1ae44cba51"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213984",
          "url": "https://support.apple.com/kb/HT213984"
        }
      ],
      "release_date": "2023-09-02T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-4733",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "Use After Free in GitHub repository vim/vim prior to 9.0.1840.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4733"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Oct/24",
          "url": "http://seclists.org/fulldisclosure/2023/Oct/24"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c",
          "url": "https://github.com/vim/vim/commit/e1dc9a627536304bc4f738c21e909ad9fcf3974c"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217",
          "url": "https://huntr.dev/bounties/1ce1fd8c-050a-4373-8004-b35b61590217"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I56ITJAFMFAQ2G3BMGTCGM3GS62V2DTR/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITRVK4FB74RZDIGTZJXOZMUW6X6F4TNF/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PFE3LDFRZ7EGWA5AU7YHYL62ELBOFZWQ/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT213984",
          "url": "https://support.apple.com/kb/HT213984"
        }
      ],
      "release_date": "2023-09-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-5344",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-5344"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Dec/10",
          "url": "http://seclists.org/fulldisclosure/2023/Dec/10"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Dec/11",
          "url": "http://seclists.org/fulldisclosure/2023/Dec/11"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Dec/9",
          "url": "http://seclists.org/fulldisclosure/2023/Dec/9"
        },
        {
          "category": "external",
          "summary": "https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04",
          "url": "https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04"
        },
        {
          "category": "external",
          "summary": "https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf",
          "url": "https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4W665GQBN6S6ZDMYWVF4X7KMFI7AQKJL/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4W665GQBN6S6ZDMYWVF4X7KMFI7AQKJL/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOXBUJLJ5VSPN3YXWN7XZA4JDYKNE7GZ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOXBUJLJ5VSPN3YXWN7XZA4JDYKNE7GZ/"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT214036",
          "url": "https://support.apple.com/kb/HT214036"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT214037",
          "url": "https://support.apple.com/kb/HT214037"
        },
        {
          "category": "external",
          "summary": "https://support.apple.com/kb/HT214038",
          "url": "https://support.apple.com/kb/HT214038"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html"
        }
      ],
      "release_date": "2023-10-02T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-53906",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
          "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
          "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-53906"
        }
      ],
      "release_date": "2025-07-15T20:52:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-05T12:50:24.210894Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422",
          "product_ids": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1767617422"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "AlmaLinux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "AlmaLinux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-X11-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-common-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-enhanced-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64",
            "Rocky Linux-9.6:vim-filesystem-2:8.2.2637-22.el9_6.1.tuxcare.els1.noarch",
            "Rocky Linux-9.6:vim-minimal-2:8.2.2637-22.el9_6.1.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}