Back to bug 2176413
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Mauro Matteo Cascella | 2023-03-08 10:49:04 UTC | CC | zdohnal | |
| Mauro Matteo Cascella | 2023-03-08 10:49:41 UTC | Blocks | 2176414 | |
| TEJ RATHI | 2023-03-14 05:32:30 UTC | Depends On | 2177970 | |
| TEJ RATHI | 2023-03-20 11:18:39 UTC | Depends On | 2179905, 2179906 | |
| TEJ RATHI | 2023-03-21 04:11:23 UTC | Doc Text | A null pointer dereference vulnerability was discovered in vim's utfc_ptr2len() function at mbyte.c file. This flaw exists because there is a use of NULL pointer with nested :open command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an issue that causes an application to crash, leading to a denial of service. | |
| RaTasha Tillery-Smith | 2023-03-21 11:49:13 UTC | Doc Text | A null pointer dereference vulnerability was discovered in vim's utfc_ptr2len() function at mbyte.c file. This flaw exists because there is a use of NULL pointer with nested :open command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an issue that causes an application to crash, leading to a denial of service. | A NULL pointer dereference vulnerability was discovered in vim's utfc_ptr2len() function in the mbyte.c file. This issue is due to using a NULL pointer with the nested :open command. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an issue that causes an application to crash, leading to a denial of service. |
| Red Hat Bugzilla | 2023-07-07 08:35:16 UTC | Assignee | security-response-team | nobody |
Back to bug 2176413