CVE-2024-47814
Published: October 8, 2024Last modified: December 20, 2024
Description
Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 4.7 |
| Attack Vector | LOCAL |
| Attack complexity | HIGH |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | vim | Fixed (9.1.0936-r0) |
| Stream | vim | Fixed (9.1.0936-r0) |
References
- https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3
- https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg
- https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
- https://security.netapp.com/advisory/ntap-20250411-0009/