Back to bug 2097768

Who When What Removed Added
Marian Rehak 2022-06-16 13:47:03 UTC Depends On 2097769
Marian Rehak 2022-06-16 13:47:05 UTC Blocks 2097770
Avinash Hanwate 2022-06-17 05:08:30 UTC CC michal.skrivanek, mperina, sbonazzo
TEJ RATHI 2022-06-20 09:20:26 UTC Fixed In Version vim 8.2 vim 8.2.5072
TEJ RATHI 2022-06-20 11:24:57 UTC Depends On 2099231
FrantiĊĦek Hrdina 2022-06-20 11:59:39 UTC CC fhrdina
TEJ RATHI 2022-06-24 07:33:35 UTC Doc Text A heap use-after-free vulnerability was found in Vim's skipwhite() function of the src/charset.c file. This flaw occurs because of uninitialized attribute value and freed memory in spell command. An attacker could trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash and corrupt memory.
RaTasha Tillery-Smith 2022-06-24 14:04:50 UTC Doc Text A heap use-after-free vulnerability was found in Vim's skipwhite() function of the src/charset.c file. This flaw occurs because of uninitialized attribute value and freed memory in spell command. An attacker could trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash and corrupt memory. A heap use-after-free vulnerability was found in Vim's skipwhite() function of the src/charset.c file. This flaw occurs because of an uninitialized attribute value and freed memory in the spell command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash and corrupt memory.
Red Hat Bugzilla 2023-07-07 08:34:16 UTC Assignee security-response-team nobody

Back to bug 2097768