[El-errata] ELSA-2026-11389 Important: Oracle Linux 10 vim security update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed Apr 29 10:32:54 UTC 2026


Oracle Linux Security Advisory ELSA-2026-11389

http://linux.oracle.com/errata/ELSA-2026-11389.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
vim-X11-9.1.083-6.0.1.el10_1.4.x86_64.rpm
vim-common-9.1.083-6.0.1.el10_1.4.x86_64.rpm
vim-data-9.1.083-6.0.1.el10_1.4.noarch.rpm
vim-enhanced-9.1.083-6.0.1.el10_1.4.x86_64.rpm
vim-filesystem-9.1.083-6.0.1.el10_1.4.noarch.rpm
vim-minimal-9.1.083-6.0.1.el10_1.4.x86_64.rpm
xxd-9.1.083-6.0.1.el10_1.4.x86_64.rpm

aarch64:
vim-X11-9.1.083-6.0.1.el10_1.4.aarch64.rpm
vim-common-9.1.083-6.0.1.el10_1.4.aarch64.rpm
vim-data-9.1.083-6.0.1.el10_1.4.noarch.rpm
vim-enhanced-9.1.083-6.0.1.el10_1.4.aarch64.rpm
vim-filesystem-9.1.083-6.0.1.el10_1.4.noarch.rpm
vim-minimal-9.1.083-6.0.1.el10_1.4.aarch64.rpm
xxd-9.1.083-6.0.1.el10_1.4.aarch64.rpm


SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/vim-9.1.083-6.0.1.el10_1.4.src.rpm

Related CVEs:

CVE-2026-34982




Description of changes:

[9.1.083-6.0.1.el10_1.4]
- Remove upstream references [Orabug: 31197557]

[2:9.1.083-6.4]
- Resolves: RHEL-164951 vim: arbitrary command execution via modeline sandbox bypass

[2:9.1.083-6.3]
- RHEL-159615 CVE-2026-33412 vim: Vim: Arbitrary code execution via command injection in glob() function

[2:9.1.083-6.2]
- RHEL-155409 CVE-2026-28421 vim: Vim: Denial of service and information disclosure via crafted swap file

[2:9.1.083-6.2]
- RHEL-155425 CVE-2026-28417 vim: Vim: Arbitrary code execution via OS command injection in the netrw plugin

[2:9.1.083-6.1]
- RHEL-147922 CVE-2026-25749 vim: Heap Overflow in Vim




More information about the El-errata mailing list