First published: Mon Dec 06 2021(Updated: )
Last updated 21 August 2024
Credit: security@huntr.dev security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.2.3741 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0861-1 |
<8.2.3741 | ||
=34 | ||
=35 | ||
=9.0 | ||
=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4069 is a vulnerability in the vim text editor that allows for a Use After Free attack.
The severity of CVE-2021-4069 is not specified in the information provided.
If you are using vim version 8.2.3761 or older, you might be affected by CVE-2021-4069. Please refer to the vendor's security advisory for more information.
To fix CVE-2021-4069, you should update vim to version 8.2.3762 or later. Refer to the vendor's security advisory for detailed instructions.
More information about CVE-2021-4069 can be found on the official CVE website or in the provided references.