CVE-2024-47814
Published: October 8, 2024Last modified: December 20, 2024
Description
Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 3.9 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | REQUIRED |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | LOW |
Availability impact | LOW |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | vim | Fixed (9.1.0936-r0) |
Stream | vim | Fixed (9.1.0936-r0) |
References
- https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3
- https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg
- https://security.netapp.com/advisory/ntap-20250411-0009/