Back to bug 2150770
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-12-08 06:05:23 UTC | Blocks | 2151568 | |
| TEJ RATHI | 2022-12-26 05:12:40 UTC | Doc Text | A heap-based buffer overflow issue was discovered in Vim's skipwhite() function of charset.c file. This flaw occurs when reading data past end of the line when compiling a function with errors. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds read, that causes an application to crash, leading to a denial of service. | |
| TEJ RATHI | 2022-12-26 05:53:45 UTC | Depends On | 2156273 | |
| Paige Jung | 2023-01-03 13:38:27 UTC | Doc Text | A heap-based buffer overflow issue was discovered in Vim's skipwhite() function of charset.c file. This flaw occurs when reading data past end of the line when compiling a function with errors. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds read, that causes an application to crash, leading to a denial of service. | A heap-based buffer overflow flaw was found in Vim's skipwhite() function of the charset.c file. This issue occurs when reading data past the end of the line when compiling a function with errors. This could allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash, leading to a denial of service. |
| Red Hat Bugzilla | 2023-02-01 08:27:36 UTC | CC | tkasparek | |
| Red Hat Bugzilla | 2023-07-07 08:34:33 UTC | Assignee | security-response-team | nobody |
Back to bug 2150770