First published: Fri Nov 05 2021(Updated: )
Last updated 24 July 2024
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.2.3581 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0709-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3927 is a vulnerability in the vim text editor that allows for a heap-based buffer overflow.
CVE-2021-3927 has a severity rating of 7.8 (High).
The affected versions of vim are 2:8.0.1453-1ubuntu1.7, 2:8.1.2269-1ubuntu5.4, 2:8.2.2434-1ubuntu1.2, 2:8.2.2434-3ubuntu3.1, 2:7.4.052-1ubuntu3.1+, 8.2.3581, 2:7.4.1689-3ubuntu1.5+, and 2:8.2.3565-1ubuntu2.
To fix CVE-2021-3927, you should update vim to version 2:8.1.0875-5+deb10u6, 2:9.0.1378-2, 2:9.0.1894-1, or 2:9.0.2018-1.
You can find more information about CVE-2021-3927 at the following references: [CVE Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927), [Huntr Dev](https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0), [GitHub Commit](https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e).