Back to bug 2176462
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2023-03-08 13:05:08 UTC | Depends On | 2176463 | |
| Zdenek Dohnal | 2023-03-09 12:47:19 UTC | Flags | needinfo?(psampaio) | |
| Pedro Sampaio | 2023-03-13 17:56:54 UTC | Blocks | 2177866 | |
| Pedro Sampaio | 2023-03-13 17:57:22 UTC | Severity | medium | low |
| Priority | medium | low | ||
| Pedro Sampaio | 2023-03-13 18:04:13 UTC | Flags | needinfo?(psampaio) | |
| TEJ RATHI | 2023-03-15 06:38:47 UTC | Doc Text | A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is an access to invalid memory with put in visual block mode. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash leading to a denial of service. | |
| RaTasha Tillery-Smith | 2023-03-15 12:39:11 UTC | Doc Text | A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is an access to invalid memory with put in visual block mode. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash leading to a denial of service. | A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash leading to a denial of service. |
| RaTasha Tillery-Smith | 2023-03-15 12:40:07 UTC | Doc Text | A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash leading to a denial of service. | A heap-based buffer overflow vulnerability was found in Vim's utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because there is access to invalid memory with put in visual block mode. An attacker can trick a user into opening a specially crafted file, triggering an out-of-bounds read that causes an application to crash, leading to a denial of service. |
| TEJ RATHI | 2023-03-20 11:16:59 UTC | Depends On | 2179904, 2179903 | |
| Red Hat Bugzilla | 2023-07-07 08:31:54 UTC | Assignee | security-response-team | nobody |
Back to bug 2176462