Source: vim
Version: 2:9.2.0136-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for vim.

CVE-2026-32249[0]:
| Vim is an open source, command line text editor. From 9.1.0011 to
| before 9.2.0137, Vim's NFA regex compiler, when encountering a
| collection containing a combining character as the endpoint of a
| character range (e.g. [0-0\u05bb]), incorrectly emits the composing
| bytes of that character as separate NFA states. This corrupts the
| NFA postfix stack, resulting in NFA_START_COLL having a NULL out1
| pointer. When nfa_max_width() subsequently traverses the compiled
| NFA to estimate match width for the look-behind assertion, it
| dereferences state->out1->out without a NULL check, causing a
| segmentation fault. This vulnerability is fixed in 9.2.0137.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-32249
    https://www.cve.org/CVERecord?id=CVE-2026-32249
[1] https://github.com/vim/vim/security/advisories/GHSA-9phh-423r-778r

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to