Metrics
Affected Vendors & Products
Thu, 14 Aug 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 12 Aug 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Tue, 12 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Aug 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vim
Vim vim |
|
Vendors & Products |
Vim
Vim vim |
Mon, 11 Aug 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim’s internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406. | |
Title | Vim double-free vulnerability during Vim9 script import operations | |
Weaknesses | CWE-415 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-12T15:51:41.020Z
Reserved: 2025-08-07T18:27:23.306Z
Link: CVE-2025-55158

Updated: 2025-08-12T15:51:36.530Z

Status : Analyzed
Published: 2025-08-11T23:15:28.037
Modified: 2025-08-12T18:49:05.347
Link: CVE-2025-55158
