First published: Thu Sep 05 2024(Updated: )
It was discovered that Vim incorrectly handled memory when closing a window, leading to a double-free vulnerability. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2024-41957) It was discovered that Vim incorrectly handled memory when adding a new file to an argument list, leading to a use-after-free. If a user was tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2024-43374)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/vim | <2:9.1.0016-1ubuntu7.2 | 2:9.1.0016-1ubuntu7.2 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/vim | <2:8.2.3995-1ubuntu2.18 | 2:8.2.3995-1ubuntu2.18 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/vim | <2:8.1.2269-1ubuntu5.24 | 2:8.1.2269-1ubuntu5.24 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/vim | <2:8.0.1453-1ubuntu1.13+esm9 | 2:8.0.1453-1ubuntu1.13+esm9 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/vim | <2:7.4.1689-3ubuntu1.5+esm24 | 2:7.4.1689-3ubuntu1.5+esm24 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/vim | <2:7.4.052-1ubuntu3.1+esm18 | 2:7.4.052-1ubuntu3.1+esm18 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.