NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51 | third party advisory exploit |
https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f | third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/ | vendor advisory |
https://security.gentoo.org/glsa/202208-32 | third party advisory vendor advisory |
https://support.apple.com/kb/HT213488 | third party advisory |
http://seclists.org/fulldisclosure/2022/Oct/41 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2022/Oct/28 | mailing list |
https://security.gentoo.org/glsa/202305-16 | vendor advisory |