CVE-2024-41957

Name
CVE-2024-41957
Description
Vim is an open source command line text editor. Vim < v9.1.0647 has double free in src/alloc.c:616. When closing a window, the corresponding tagstack data will be cleared and freed. However a bit later, the quickfix list belonging to that window will also be cleared and if that quickfix list points to the same tagstack data, Vim will try to free it again, resulting in a double-free/use-after-free access exception. Impact is low since the user must intentionally execute vim with several non-default flags, but it may cause a crash of Vim. The issue has been fixed as of Vim patch v9.1.0647
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://github.com/vim/vim/security/advisories/GHSA-f9cr-gv85-hcr4
MISC https://github.com/vim/vim/commit/8a0bbe7b8aad6f8da28dee218c01bc8a0185a

Match rules

CPE URI Source package Min version Max version
vim >= 0 < 9.1.0647

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
vim 3.19-main 9.0.2127-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
vim 3.18-main 9.0.2073-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable
vim 3.17-main 9.0.0999-r0 Natanael Copa <ncopa@alpinelinux.org> possibly vulnerable