CVE-2024-41965
CVSS V2 None
CVSS V3 None
Description
Vim is an open source command line text editor. double-free in dialog_changed() in Vim < v9.1.0648. When abandoning a buffer, Vim may ask the user what to do with the modified buffer. If the user wants the changed buffer to be saved, Vim may create a new Untitled file, if the buffer did not have a name yet. However, when setting the buffer name to Unnamed, Vim will falsely free a pointer twice, leading to a double-free and possibly later to a heap-use-after-free, which can lead to a crash. The issue has been fixed as of Vim patch v9.1.0648.
Overview
- CVE ID
- CVE-2024-41965
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-08-01T21:44:09.056Z
- Last Modified Date
- 2024-08-01T21:44:09.056Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/vim/vim/security/advisories/GHSA-46pw-v7qw-xc2f | x_refsource_CONFIRM |
https://github.com/vim/vim/commit/b29f4abcd4b3382fa746edd1d0562b7b48c | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-41965 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41965 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-08-02 13:07:52 | Added to TrackCVE |