Back to bug 2097768
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Marian Rehak | 2022-06-16 13:47:03 UTC | Depends On | 2097769 | |
| Marian Rehak | 2022-06-16 13:47:05 UTC | Blocks | 2097770 | |
| Avinash Hanwate | 2022-06-17 05:08:30 UTC | CC | michal.skrivanek, mperina, sbonazzo | |
| TEJ RATHI | 2022-06-20 09:20:26 UTC | Fixed In Version | vim 8.2 | vim 8.2.5072 |
| TEJ RATHI | 2022-06-20 11:24:57 UTC | Depends On | 2099231 | |
| FrantiĊĦek Hrdina | 2022-06-20 11:59:39 UTC | CC | fhrdina | |
| TEJ RATHI | 2022-06-24 07:33:35 UTC | Doc Text | A heap use-after-free vulnerability was found in Vim's skipwhite() function of the src/charset.c file. This flaw occurs because of uninitialized attribute value and freed memory in spell command. An attacker could trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash and corrupt memory. | |
| RaTasha Tillery-Smith | 2022-06-24 14:04:50 UTC | Doc Text | A heap use-after-free vulnerability was found in Vim's skipwhite() function of the src/charset.c file. This flaw occurs because of uninitialized attribute value and freed memory in spell command. An attacker could trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash and corrupt memory. | A heap use-after-free vulnerability was found in Vim's skipwhite() function of the src/charset.c file. This flaw occurs because of an uninitialized attribute value and freed memory in the spell command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash and corrupt memory. |
| Red Hat Bugzilla | 2023-07-07 08:34:16 UTC | Assignee | security-response-team | nobody |
Back to bug 2097768