UBUNTU-CVE-2026-34982

Source
https://ubuntu.com/security/CVE-2026-34982
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34982.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2026-34982
Upstream
Downstream
Related
Published
2026-04-06T16:16:00Z
Modified
2026-04-16T11:05:36.673107Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The complete, guitabtooltip and printheader options are missing the P_MLE flag, allowing a modeline to be executed. Additionally, the mapset() function lacks a check_secure() call, allowing it to be abused from sandboxed expressions. Commit 9.2.0276 fixes the issue.

References

Affected packages

Ubuntu:Pro:20.04:LTS / vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:8.1.2269-1ubuntu5.32+esm3?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:8.1.2269-1ubuntu5.32+esm3

Affected versions

2:8.*
2:8.1.0875-5ubuntu2
2:8.1.0875-5ubuntu3
2:8.1.0875-5ubuntu4
2:8.1.2269-1ubuntu1
2:8.1.2269-1ubuntu4
2:8.1.2269-1ubuntu5
2:8.1.2269-1ubuntu5.3
2:8.1.2269-1ubuntu5.4
2:8.1.2269-1ubuntu5.6
2:8.1.2269-1ubuntu5.7
2:8.1.2269-1ubuntu5.8
2:8.1.2269-1ubuntu5.9
2:8.1.2269-1ubuntu5.11
2:8.1.2269-1ubuntu5.12
2:8.1.2269-1ubuntu5.13
2:8.1.2269-1ubuntu5.14
2:8.1.2269-1ubuntu5.15
2:8.1.2269-1ubuntu5.16
2:8.1.2269-1ubuntu5.17
2:8.1.2269-1ubuntu5.18
2:8.1.2269-1ubuntu5.20
2:8.1.2269-1ubuntu5.21
2:8.1.2269-1ubuntu5.22
2:8.1.2269-1ubuntu5.23
2:8.1.2269-1ubuntu5.24
2:8.1.2269-1ubuntu5.25
2:8.1.2269-1ubuntu5.26
2:8.1.2269-1ubuntu5.29
2:8.1.2269-1ubuntu5.30
2:8.1.2269-1ubuntu5.31
2:8.1.2269-1ubuntu5.32
2:8.1.2269-1ubuntu5.32+esm2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim-athena"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim-common"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim-gtk"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim-gtk3"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim-gui-common"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim-nox"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim-runtime"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "vim-tiny"
        },
        {
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm3",
            "binary_name": "xxd"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34982.json"

Ubuntu:22.04:LTS / vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:8.2.3995-1ubuntu2.27?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:8.2.3995-1ubuntu2.27

Affected versions

2:8.*
2:8.2.2434-3ubuntu3
2:8.2.2434-3ubuntu4
2:8.2.3565-1ubuntu1
2:8.2.3565-1ubuntu2
2:8.2.3565-1ubuntu3
2:8.2.3565-1ubuntu5
2:8.2.3995-1ubuntu1
2:8.2.3995-1ubuntu2
2:8.2.3995-1ubuntu2.1
2:8.2.3995-1ubuntu2.3
2:8.2.3995-1ubuntu2.4
2:8.2.3995-1ubuntu2.5
2:8.2.3995-1ubuntu2.7
2:8.2.3995-1ubuntu2.8
2:8.2.3995-1ubuntu2.9
2:8.2.3995-1ubuntu2.10
2:8.2.3995-1ubuntu2.11
2:8.2.3995-1ubuntu2.12
2:8.2.3995-1ubuntu2.13
2:8.2.3995-1ubuntu2.15
2:8.2.3995-1ubuntu2.16
2:8.2.3995-1ubuntu2.17
2:8.2.3995-1ubuntu2.18
2:8.2.3995-1ubuntu2.19
2:8.2.3995-1ubuntu2.20
2:8.2.3995-1ubuntu2.21
2:8.2.3995-1ubuntu2.22
2:8.2.3995-1ubuntu2.23
2:8.2.3995-1ubuntu2.24
2:8.2.3995-1ubuntu2.26

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim-athena"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim-common"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim-gtk"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim-gtk3"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim-gui-common"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim-nox"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim-runtime"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "vim-tiny"
        },
        {
            "binary_version": "2:8.2.3995-1ubuntu2.27",
            "binary_name": "xxd"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34982.json"

Ubuntu:24.04:LTS / vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:9.1.0016-1ubuntu7.11?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.1.0016-1ubuntu7.11

Affected versions

2:9.*
2:9.0.1672-1ubuntu2
2:9.0.2087-1ubuntu1
2:9.0.2116-1ubuntu1
2:9.0.2116-1ubuntu2
2:9.0.2184-0ubuntu1
2:9.0.2189-1ubuntu1
2:9.1.0-1ubuntu1
2:9.1.0016-1ubuntu2
2:9.1.0016-1ubuntu6
2:9.1.0016-1ubuntu7
2:9.1.0016-1ubuntu7.1
2:9.1.0016-1ubuntu7.2
2:9.1.0016-1ubuntu7.3
2:9.1.0016-1ubuntu7.4
2:9.1.0016-1ubuntu7.5
2:9.1.0016-1ubuntu7.6
2:9.1.0016-1ubuntu7.7
2:9.1.0016-1ubuntu7.8
2:9.1.0016-1ubuntu7.9
2:9.1.0016-1ubuntu7.10

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim-athena"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim-common"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim-gtk3"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim-gui-common"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim-motif"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim-nox"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim-runtime"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "vim-tiny"
        },
        {
            "binary_version": "2:9.1.0016-1ubuntu7.11",
            "binary_name": "xxd"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34982.json"

Ubuntu:25.10 / vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:9.1.0967-1ubuntu6.2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.1.0967-1ubuntu6.2

Affected versions

2:9.*
2:9.1.0967-1ubuntu4
2:9.1.0967-1ubuntu5
2:9.1.0967-1ubuntu6
2:9.1.0967-1ubuntu6.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim-athena"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim-common"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim-gtk3"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim-gui-common"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim-motif"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim-nox"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim-runtime"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "vim-tiny"
        },
        {
            "binary_version": "2:9.1.0967-1ubuntu6.2",
            "binary_name": "xxd"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-34982.json"