First published: Wed Sep 15 2021(Updated: )
vim is vulnerable to Use After Free
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.2.3428 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
NetApp ONTAP Select Deploy administration utility |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3796 is a vulnerability in vim that allows for use after free.
CVE-2021-3796 has a high severity rating of 7.3.
The affected software includes Vim version up to 8.2.3428, Fedora versions 33-35, Debian Linux version 9.0, and NetApp ONTAP Select Deploy administration utility.
To fix CVE-2021-3796, users should update to a patched version of Vim or apply necessary security patches provided by the respective software vendors.
You can find more information about CVE-2021-3796 at the following references: [http://www.openwall.com/lists/oss-security/2021/10/01/1](http://www.openwall.com/lists/oss-security/2021/10/01/1), [https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3](https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3), [https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d](https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d).