Eli, sorry for the duplicate. I messed up the reply...

On Mon, 20 Jan 2025, Eli Schwartz wrote:

> It seems strange to me to say that it is a vulnerability, for a vim
> option that accepts a full-blown script to also crash when fuzzed.
>
> It's not an attack vector to crash /bin/bash when fed a malformed
> script, so why is there anything to comment on with regard to vim 
> either?

It was reported to us via the Security Advisory feature of Github and
while I am convinced that this cannot be used to do any harm to users
(except for crashing), there was still a small possibility that this may
have been abused in the future.

So when in doubt, I go with the handling this as security relevant.

> How is this "medium" impact?

The CVE calculator tends to exaggerate the score, even when being
conservative with each metric.

Thanks,
Christian

Reply via email to