Source: vim X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerability was published for vim. CVE-2024-47814[0]: | Vim is an open source, command line text editor. A use-after-free | was found in Vim < 9.1.0764. When closing a buffer (visible in a | window) a BufWinLeave auto command can cause an use-after-free if | this auto command happens to re-open the same buffer in a new split | window. Impact is low since the user must have intentionally set up | such a strange auto command and run some buffer unload commands. | However this may lead to a crash. This issue has been addressed in | version 9.1.0764 and all users are advised to upgrade. There are no | known workarounds for this vulnerability. https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3 (v9.1.0764) If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-47814 https://www.cve.org/CVERecord?id=CVE-2024-47814 Please adjust the affected versions in the BTS as needed.