Unchecked Return Value The advisory has been revoked - it doesn't affect any version of package vim-filesystem Open this link in a new tab
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-VIMFILESYSTEM-3245371
- published 24 Jan 2023
- disclosed 20 Jan 2023
Amendment
The Red Hat
security team deemed this advisory irrelevant for RHEL:8
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-filesystem
package and not the vim-filesystem
package as distributed by RHEL
.
A null pointer dereference issue was discovered in function gui_x11_create_blank_mouse in gui_x11.c in vim 8.1.2269 thru 9.0.0339 allows attackers to cause denial of service or other unspecified impacts.
References
- https://access.redhat.com/security/cve/CVE-2022-47024
- https://access.redhat.com/errata/RHSA-2023:0958
- https://github.com/vim/vim/commit/a63ad78ed31e36dbdf3a9cd28071dcdbefce7d19
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
- https://security.gentoo.org/glsa/202305-16
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/