First published: Sat Dec 25 2021(Updated: )
Last updated 24 July 2024
Credit: security@huntr.dev CVE-2021-4136 CVE-2021-4166 CVE-2021-4173 CVE-2021-4187 CVE-2021-4192 CVE-2021-4193 CVE-2021-46059 CVE-2022-0128 CVE-2022-0156 CVE-2022-0158 CVE-2021-4136 CVE-2021-4166 CVE-2021-4173 CVE-2021-4187 CVE-2021-4192 CVE-2021-4193 CVE-2021-46059 CVE-2022-0128 security@huntr.dev CVE-2021-4136 CVE-2021-4166 CVE-2021-4173 CVE-2021-4187 CVE-2021-4192 CVE-2021-4193 CVE-2021-46059 CVE-2022-0128 security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <8.2.3884 | |
Redhat Enterprise Linux | =8.0 | |
openSUSE Factory | ||
SUSE Linux Enterprise | =12.0 | |
SUSE Linux Enterprise | =15.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-security_update_2021-004 | |
Apple Mac OS X | =10.15.7-security_update_2021-005 | |
Apple Mac OS X | =10.15.7-security_update_2021-006 | |
Apple Mac OS X | =10.15.7-security_update_2021-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-008 | |
Apple Mac OS X | =10.15.7-security_update_2022-001 | |
Apple Mac OS X | =10.15.7-security_update_2022-002 | |
Apple Mac OS X | =10.15.7-security_update_2022-003 | |
Apple macOS | <12.3 | |
Apple macOS | >=11.0<11.6.6 | |
Apple macOS | =10.15.7-security_update_2022-004 | |
Apple macOS Monterey | <12.3 | 12.3 |
Apple Catalina | ||
Apple macOS Big Sur | <11.6.6 | 11.6.6 |
debian/vim | <=2:8.2.2434-3+deb11u1 | 2:9.0.1378-2 2:9.1.0861-1 |
<8.2.3884 | ||
=8.0 | ||
=12.0 | ||
=15.0 | ||
=9.0 | ||
=10.0 | ||
=11.0 | ||
=34 | ||
=35 | ||
=10.15.7 | ||
=10.15.7-security_update_2020-001 | ||
=10.15.7-security_update_2021-001 | ||
=10.15.7-security_update_2021-002 | ||
=10.15.7-security_update_2021-003 | ||
=10.15.7-security_update_2021-004 | ||
=10.15.7-security_update_2021-005 | ||
=10.15.7-security_update_2021-006 | ||
=10.15.7-security_update_2021-007 | ||
=10.15.7-security_update_2021-008 | ||
=10.15.7-security_update_2022-001 | ||
=10.15.7-security_update_2022-002 | ||
=10.15.7-security_update_2022-003 | ||
<12.3 | ||
>=11.0<11.6.6 | ||
=10.15.7-security_update_2022-004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-4166 is a vulnerability that allows for out-of-bounds read in Vim.
CVE-2021-4166 allows an attacker to read data outside of the bounds of an array in Vim, potentially leading to information disclosure or a crash.
Yes, Apple Catalina is affected by CVE-2021-4166.
The recommended version of macOS Big Sur to fix CVE-2021-4166 is 11.6.6.
To fix the CVE-2021-4166 vulnerability on Ubuntu, update the vim package to version 2:8.1.2269-1ubuntu5.14 or later.
To fix the CVE-2021-4166 vulnerability on Debian, update the vim package to version 2:9.0.1378-2 or 2:9.0.1894-1, depending on the Debian version.