Back to bug 2123709
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-09-02 11:54:43 UTC | Depends On | 2123710 | |
| TEJ RATHI | 2022-09-02 11:55:50 UTC | Blocks | 2122683 | |
| TEJ RATHI | 2022-09-05 07:35:21 UTC | Fixed In Version | vim 9.0.0259 | |
| TEJ RATHI | 2022-09-06 06:49:52 UTC | Doc Text | A null pointer dereference vulnerability was found in Vim's do_mouse() function of the src/mouse.c file. This flaw occurs with a mouse click when it's not initialized. This flaw allows an attacker to trick a user into opening a specially crafted input file, triggering the vulnerability that could cause an application to crash. | |
| TEJ RATHI | 2022-09-06 07:42:19 UTC | Depends On | 2124445, 2124444 | |
| RaTasha Tillery-Smith | 2022-09-06 14:38:08 UTC | Doc Text | A null pointer dereference vulnerability was found in Vim's do_mouse() function of the src/mouse.c file. This flaw occurs with a mouse click when it's not initialized. This flaw allows an attacker to trick a user into opening a specially crafted input file, triggering the vulnerability that could cause an application to crash. | A NULL pointer dereference vulnerability was found in vim's do_mouse() function of the src/mouse.c file. The issue occurs with a mouse click when it is not initialized. This flaw allows an attacker to trick a user into opening a specially crafted input file, triggering the vulnerability that could cause an application to crash. |
| Red Hat Bugzilla | 2023-07-07 08:35:29 UTC | Assignee | security-response-team | nobody |
Back to bug 2123709