Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-55157

Опубликовано: 11 авг. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.8

Описание

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

РелизСтатусПримечание
devel

not-affected

see notes
esm-infra-legacy/trusty

not-affected

see notes
esm-infra/bionic

not-affected

see notes
esm-infra/focal

not-affected

see notes
esm-infra/xenial

not-affected

see notes
jammy

not-affected

see notes
noble

not-affected

see notes
plucky

not-affected

see notes
upstream

released

9.1.1400

Показывать по

EPSS

Процентиль: 23%
0.00075
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 8.8
nvd
4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 8.8
debian
4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1. ...

CVSS3: 8.8
fstec
4 месяца назад

Уязвимость функции tuple_unref() текстового редактора vim, позволяющая нарушителю выполнить произвольный код

suse-cvrf
3 месяца назад

Security update for vim

EPSS

Процентиль: 23%
0.00075
Низкий

8.8 High

CVSS3