Back to bug 2176462

Who When What Removed Added
Pedro Sampaio 2023-03-08 13:05:08 UTC Depends On 2176463
Zdenek Dohnal 2023-03-09 12:47:19 UTC Flags needinfo?(psampaio)
Pedro Sampaio 2023-03-13 17:56:54 UTC Blocks 2177866
Pedro Sampaio 2023-03-13 17:57:22 UTC Severity medium low
Priority medium low
Pedro Sampaio 2023-03-13 18:04:13 UTC Flags needinfo?(psampaio)
TEJ RATHI 2023-03-15 06:38:47 UTC Doc Text A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is an access to invalid memory with put in visual block mode. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash leading to a denial of service.
RaTasha Tillery-Smith 2023-03-15 12:39:11 UTC Doc Text A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is an access to invalid memory with put in visual block mode. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash leading to a denial of service. A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash leading to a denial of service.
RaTasha Tillery-Smith 2023-03-15 12:40:07 UTC Doc Text A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash leading to a denial of service. A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash, leading to a denial of service.
TEJ RATHI 2023-03-20 11:16:59 UTC Depends On 2179904, 2179903
Red Hat Bugzilla 2023-07-07 08:31:54 UTC Assignee security-response-team nobody

Back to bug 2176462