Back to bug 2106775

Who When What Removed Added
Guilherme de Almeida Suckevicz 2022-07-13 14:11:48 UTC Blocks 2106038
Guilherme de Almeida Suckevicz 2022-07-13 14:38:38 UTC Fixed In Version vim 9.0.0047
Guilherme de Almeida Suckevicz 2022-07-13 16:09:48 UTC Doc Text An use-after-free vulnerability was found in Vim in the skipwhite function in the charset.c file. This issue occurs because an already freed memory is used when an specially crafted input is processed. An attacker able to trick an user into opening a specially crafted file will trigger the use-after-free and cause the application to crash, possibly executing code and corrupting memory.
Guilherme de Almeida Suckevicz 2022-07-13 18:07:11 UTC Depends On 2106871
RaTasha Tillery-Smith 2022-07-13 20:17:02 UTC Doc Text An use-after-free vulnerability was found in Vim in the skipwhite function in the charset.c file. This issue occurs because an already freed memory is used when an specially crafted input is processed. An attacker able to trick an user into opening a specially crafted file will trigger the use-after-free and cause the application to crash, possibly executing code and corrupting memory. A use-after-free vulnerability was found in Vim in the skipwhite function in the charset.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, trigger a use-after-free, and cause the application to crash, possibly executing code and corrupting memory.
Guilherme de Almeida Suckevicz 2022-07-14 17:29:43 UTC Depends On 2107305
Guilherme de Almeida Suckevicz 2022-07-19 16:19:24 UTC Doc Text A use-after-free vulnerability was found in Vim in the skipwhite function in the charset.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker to trick a user into opening a specially crafted file, trigger a use-after-free, and cause the application to crash, possibly executing code and corrupting memory. A use-after-free vulnerability was found in Vim in the skipwhite function in the charset.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, and cause the application to crash, possibly executing code and corrupting memory.
Red Hat Bugzilla 2023-07-07 08:32:14 UTC Assignee security-response-team nobody

Back to bug 2106775