Back to bug 2104416

Who When What Removed Added
TEJ RATHI 2022-07-06 08:31:59 UTC Depends On 2104417
TEJ RATHI 2022-07-06 08:35:01 UTC Blocks 2104136
TEJ RATHI 2022-07-06 10:55:23 UTC Depends On 2104460
TEJ RATHI 2022-07-06 11:02:24 UTC Doc Text A stack-based buffer overflow vulnerability was found in vim's spell_dump_compl() function of the src/spell.c file. This flaw occurs because the spell dump goes beyond end of an array, when crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory.
RaTasha Tillery-Smith 2022-07-06 13:25:29 UTC Doc Text A stack-based buffer overflow vulnerability was found in vim's spell_dump_compl() function of the src/spell.c file. This flaw occurs because the spell dump goes beyond end of an array, when crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory. A stack-based buffer overflow vulnerability was found in Vim's spell_dump_compl() function of the src/spell.c file. This issue occurs because the spell dump goes beyond the end of an array when crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory.
Red Hat Bugzilla 2023-07-07 08:35:28 UTC Assignee security-response-team nobody

Back to bug 2104416