Unchecked Return Value Affecting vim-common package, versions <2:8.2.2637-20.el9_1
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL9-VIMCOMMON-3556316
- published 24 Jan 2023
- disclosed 20 Jan 2023
How to fix?
Upgrade RHEL:9 vim-common to version 2:8.2.2637-20.el9_1 or higher.
This issue was patched in RHSA-2023:0958.
NVD Description
Note: Versions mentioned in the description apply only to the upstream vim-common package and not the vim-common package as distributed by RHEL.
See How to fix? for RHEL:9 relevant fixed versions and status.
A null pointer dereference issue was discovered in function gui_x11_create_blank_mouse in gui_x11.c in vim 8.1.2269 thru 9.0.0339 allows attackers to cause denial of service or other unspecified impacts.
References
- https://access.redhat.com/security/cve/CVE-2022-47024
- https://access.redhat.com/errata/RHSA-2023:0958
- https://github.com/vim/vim/commit/a63ad78ed31e36dbdf3a9cd28071dcdbefce7d19
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
- https://security.gentoo.org/glsa/202305-16
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/
CVSS Scores
version 3.1