Amazon Linux 2023 Security Advisory: ALAS2023-2026-1667
Advisory Released Date: 2026-05-14
Advisory Updated Date: 2026-05-14
Severity:
Important
Issue Overview:
Vim is an open source, command line text editor. Prior to 9.2.0357, A command injection vulnerability exists in Vim's tag file processing. When resolving a tag, the filename field from the tags file is passed through wildcard expansion to resolve environment variables and wildcards. If the filename field contains backtick syntax (e.g., `command`), Vim executes the embedded command via the system shell with the full privileges of the running user. (CVE-2026-41411)
Affected Packages:
vim
Issue Correction:
Run dnf update vim --releasever 2023.11.20260511 or dnf update --advisory ALAS2023-2026-1667 --releasever 2023.11.20260511 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
New Packages:
aarch64:
vim-enhanced-debuginfo-9.2.240-1.amzn2023.0.3.aarch64
vim-minimal-9.2.240-1.amzn2023.0.3.aarch64
xxd-9.2.240-1.amzn2023.0.3.aarch64
vim-debuginfo-9.2.240-1.amzn2023.0.3.aarch64
vim-minimal-debuginfo-9.2.240-1.amzn2023.0.3.aarch64
vim-debugsource-9.2.240-1.amzn2023.0.3.aarch64
xxd-debuginfo-9.2.240-1.amzn2023.0.3.aarch64
vim-enhanced-9.2.240-1.amzn2023.0.3.aarch64
vim-common-9.2.240-1.amzn2023.0.3.aarch64
noarch:
vim-data-9.2.240-1.amzn2023.0.3.noarch
vim-filesystem-9.2.240-1.amzn2023.0.3.noarch
vim-default-editor-9.2.240-1.amzn2023.0.3.noarch
src:
vim-9.2.240-1.amzn2023.0.3.src
x86_64:
vim-enhanced-debuginfo-9.2.240-1.amzn2023.0.3.x86_64
vim-debugsource-9.2.240-1.amzn2023.0.3.x86_64
xxd-9.2.240-1.amzn2023.0.3.x86_64
xxd-debuginfo-9.2.240-1.amzn2023.0.3.x86_64
vim-minimal-debuginfo-9.2.240-1.amzn2023.0.3.x86_64
vim-minimal-9.2.240-1.amzn2023.0.3.x86_64
vim-enhanced-9.2.240-1.amzn2023.0.3.x86_64
vim-common-9.2.240-1.amzn2023.0.3.x86_64
vim-debuginfo-9.2.240-1.amzn2023.0.3.x86_64