CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
AI Score
Confidence
Low
It was discovered that Vim incorrectly handled memory when closing a
window, leading to a double-free vulnerability. If a user was tricked
into opening a specially crafted file, an attacker could crash the
application, leading to a denial of service, or possibly achieve code
execution with user privileges. (CVE-2024-41957)
It was discovered that Vim incorrectly handled memory when adding a new
file to an argument list, leading to a use-after-free. If a user was
tricked into opening a specially crafted file, an attacker could crash
the application, leading to a denial of service. (CVE-2024-43374)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 24.04 | noarch | vim | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-athena | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-common | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-dbgsym | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-doc | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-gtk3 | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-gtk3-dbgsym | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-gui-common | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-motif | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | vim-motif-dbgsym | < 2:9.1.0016-1ubuntu7.2 | UNKNOWN |