Bug 2443496

Summary: CVE-2026-28417 vim: Vim: Arbitrary code execution via OS command injection in the netrw plugin [fedora-43]
Product: [Fedora] Fedora Reporter: Jon Moroney <jmoroney>
Component: vimAssignee: Zdenek Dohnal <zdohnal>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: medium    
Version: 43CC: carl, fhrdina, zdohnal
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["66bdde53-abd4-46a5-a11f-9e576d072581"]}
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2026-03-03 11:43:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2443455    

Description Jon Moroney 2026-02-27 23:35:31 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Zdenek Dohnal 2026-03-03 11:43:33 UTC

*** This bug has been marked as a duplicate of bug 2443790 ***