Source: vim
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for vim.

CVE-2024-47814[0]:
| Vim is an open source, command line text editor. A use-after-free
| was found in Vim < 9.1.0764. When closing a buffer (visible in a
| window) a BufWinLeave auto command can cause an use-after-free if
| this auto command happens to re-open the same buffer in a new split
| window. Impact is low since the user must have intentionally set up
| such a strange auto command and run some buffer unload commands.
| However this may lead to a crash. This issue has been addressed in
| version 9.1.0764 and all users are advised to upgrade. There are no
| known workarounds for this vulnerability.

https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg
https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3 (v9.1.0764)


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-47814
    https://www.cve.org/CVERecord?id=CVE-2024-47814

Please adjust the affected versions in the BTS as needed.

Reply via email to