Source: vim Version: 2:9.2.0136-1 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for vim. CVE-2026-32249[0]: | Vim is an open source, command line text editor. From 9.1.0011 to | before 9.2.0137, Vim's NFA regex compiler, when encountering a | collection containing a combining character as the endpoint of a | character range (e.g. [0-0\u05bb]), incorrectly emits the composing | bytes of that character as separate NFA states. This corrupts the | NFA postfix stack, resulting in NFA_START_COLL having a NULL out1 | pointer. When nfa_max_width() subsequently traverses the compiled | NFA to estimate match width for the look-behind assertion, it | dereferences state->out1->out without a NULL check, causing a | segmentation fault. This vulnerability is fixed in 9.2.0137. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-32249 https://www.cve.org/CVERecord?id=CVE-2026-32249 [1] https://github.com/vim/vim/security/advisories/GHSA-9phh-423r-778r Please adjust the affected versions in the BTS as needed. Regards, Salvatore

