First published: Wed Dec 01 2021(Updated: )
Last updated 21 August 2024
Credit: security@huntr.dev security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.2.3669 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0861-1 |
<8.2.3669 | ||
=34 | ||
=35 | ||
=9.0 | ||
=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2021-4019.
The title of this vulnerability is 'vim is vulnerable to Heap-based Buffer Overflow'.
The software affected by this vulnerability is vim.
The severity of this vulnerability depends on various factors such as the attacker's skill level and the system's configuration.
To fix this vulnerability, update the vim software to version 2:8.0.1453-1ubuntu1.8 or higher if you are using Ubuntu, or version 2:8.1.0875-5+deb10u5 or higher if you are using Debian.