Bug 2447359

Summary: CVE-2026-32249 vim: NFA regex engine NULL pointer dereference [fedora-all]
Product: [Fedora] Fedora Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vimAssignee: Zdenek Dohnal <zdohnal>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: low Docs Contact:
Priority: low    
Version: rawhideCC: carl, fhrdina, zdohnal
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["65476976-40a4-4acb-985f-abd39a70a547"]}
Fixed In Version: vim-9.2.148-1.fc43 Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2026-03-17 00:49:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2447110    

Description Guilherme de Almeida Suckevicz 2026-03-13 16:58:37 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Fedora Update System 2026-03-16 09:02:43 UTC
FEDORA-2026-1885157e34 (vim-9.2.148-1.fc42) has been submitted as an update to Fedora 42.
https://bodhi.fedoraproject.org/updates/FEDORA-2026-1885157e34

Comment 2 Fedora Update System 2026-03-16 09:03:58 UTC
FEDORA-2026-7eaf665007 (vim-9.2.148-1.fc43) has been submitted as an update to Fedora 43.
https://bodhi.fedoraproject.org/updates/FEDORA-2026-7eaf665007

Comment 3 Fedora Update System 2026-03-16 09:05:00 UTC
FEDORA-2026-f5d072060b (vim-9.2.148-1.fc44) has been submitted as an update to Fedora 44.
https://bodhi.fedoraproject.org/updates/FEDORA-2026-f5d072060b

Comment 4 Fedora Update System 2026-03-17 00:49:24 UTC
FEDORA-2026-7eaf665007 (vim-9.2.148-1.fc43) has been pushed to the Fedora 43 stable repository.
If problem still persists, please make note of it in this bug report.