First published: Sat Dec 25 2021(Updated: )
apache. Multiple issues were addressed by updating apache to version 2.4.53.
Credit: CVE-2021-4136 CVE-2021-4166 CVE-2021-4173 CVE-2021-4187 CVE-2021-4192 CVE-2021-4193 CVE-2021-46059 CVE-2022-0128 CVE-2022-0156 CVE-2022-0158 Arsenii Kostromin (0x3c3e) MicrosoftJonathan Bar Or MicrosoftZhipeng Huo @R3dF09 Tencent Security Xuanwu LabYuebin Sun @yuebinsun2020 Tencent Security Xuanwu LabMax Shavrick @_mxms the Google Security TeamZubair Ashraf CrowdstrikeCVE-2022-0778 CVE-2022-23308 Mickey Jin @patch1t @gorelics an anonymous researcher Linus Henze Pinauten GmbHPeter Nguyễn Vũ Hoàng STAR LabsFelix Poulin-Belanger Antonio Cheong Yu Xuan YCISCQArsenii Kostromin (0x3c3e) Heige KnownSec 404 TeamBo Qu Palo Alto NetworksScarlet Raine Wang Yu CyberservalCVE-2022-0530 Tavis Ormandy CVE-2021-45444 Liu Long Ant Security LightJack Dates RET2 Systems IncAntonio Zekic @antoniozekic Jeonghoon Shin Theori working with Trend Micro Zero Day InitiativePeter Nguyễn Vũ Hoàng @peternguyen14 STAR LabsNed Williamson Google Project Zero @gorelics BreakPoint BreakPointRon Masas BreakPointWojciech Reguła @_r3ggi SecuRingYonghwi Jin @jinmo123 TheoriLockheed Martin Red Team Jeremy Brown Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeQi Sun Trend MicroYe Zhang @co0py_Cat Baidu SecurityRobert Ai Trend MicroCVE-2021-44224 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.6.6 | 11.6.6 |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.1113-1 |
macOS Catalina | ||
macOS | <12.3 | 12.3 |
SUSE Vim | <8.2.3884 | |
Red Hat Enterprise Linux | =8.0 | |
openSUSE | ||
SUSE Linux Enterprise Server | =12.0 | |
SUSE Linux Enterprise Server | =15.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
Fedora | =34 | |
Fedora | =35 | |
Apple iOS and macOS | =10.15.7 | |
Apple iOS and macOS | =10.15.7-security_update_2020-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-002 | |
Apple iOS and macOS | =10.15.7-security_update_2021-003 | |
Apple iOS and macOS | =10.15.7-security_update_2021-004 | |
Apple iOS and macOS | =10.15.7-security_update_2021-005 | |
Apple iOS and macOS | =10.15.7-security_update_2021-006 | |
Apple iOS and macOS | =10.15.7-security_update_2021-007 | |
Apple iOS and macOS | =10.15.7-security_update_2021-008 | |
Apple iOS and macOS | =10.15.7-security_update_2022-001 | |
Apple iOS and macOS | =10.15.7-security_update_2022-002 | |
Apple iOS and macOS | =10.15.7-security_update_2022-003 | |
Apple iOS and macOS | <12.3 | |
Apple iOS and macOS | >=11.0<11.6.6 | |
Apple iOS and macOS | =10.15.7-security_update_2022-004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-4166 is a vulnerability that allows for out-of-bounds read in Vim.
CVE-2021-4166 allows an attacker to read data outside of the bounds of an array in Vim, potentially leading to information disclosure or a crash.
Yes, Apple Catalina is affected by CVE-2021-4166.
The recommended version of macOS Big Sur to fix CVE-2021-4166 is 11.6.6.
To fix the CVE-2021-4166 vulnerability on Ubuntu, update the vim package to version 2:8.1.2269-1ubuntu5.14 or later.
To fix the CVE-2021-4166 vulnerability on Debian, update the vim package to version 2:9.0.1378-2 or 2:9.0.1894-1, depending on the Debian version.