Description
Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg
Patch x_refsource_misc
https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3
Third Party Advisory
https://security.netapp.com/advisory/ntap-20250411-0009/
Scores
CVSS v3
3.9
EPSS
0.0007
EPSS Percentile
21.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-416
Status
published
Products (2)
netapp/bootstrap_os
vim/vim
< 9.1.0764
Published
Oct 07, 2024
Tracked Since
Feb 18, 2026