Back to bug 2104416
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-07-06 08:31:59 UTC | Depends On | 2104417 | |
| TEJ RATHI | 2022-07-06 08:35:01 UTC | Blocks | 2104136 | |
| TEJ RATHI | 2022-07-06 10:55:23 UTC | Depends On | 2104460 | |
| TEJ RATHI | 2022-07-06 11:02:24 UTC | Doc Text | A stack-based buffer overflow vulnerability was found in vim's spell_dump_compl() function of the src/spell.c file. This flaw occurs because the spell dump goes beyond end of an array, when crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory. | |
| RaTasha Tillery-Smith | 2022-07-06 13:25:29 UTC | Doc Text | A stack-based buffer overflow vulnerability was found in vim's spell_dump_compl() function of the src/spell.c file. This flaw occurs because the spell dump goes beyond end of an array, when crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory. | A stack-based buffer overflow vulnerability was found in Vim's spell_dump_compl() function of the src/spell.c file. This issue occurs because the spell dump goes beyond the end of an array when crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory. |
| Red Hat Bugzilla | 2023-07-07 08:35:28 UTC | Assignee | security-response-team | nobody |
Back to bug 2104416