CVE Vulnerabilities

CVE-2024-47814

Use After Free

Published: Oct 07, 2024 | Modified: Aug 18, 2025
CVSS 3.x
4.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
3.9 LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
Ubuntu
LOW

Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

Name Vendor Start Version End Version
Vim Vim * 9.1.0764 (excluding)
Vim Ubuntu esm-infra-legacy/trusty *
Vim Ubuntu esm-infra/bionic *
Vim Ubuntu esm-infra/focal *
Vim Ubuntu esm-infra/xenial *
Vim Ubuntu focal *
Vim Ubuntu jammy *
Vim Ubuntu noble *
Vim Ubuntu oracular *
Vim Ubuntu trusty/esm *
Vim Ubuntu upstream *

Potential Mitigations

References