Back to bug 2014661
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-10-15 18:28:19 UTC | Depends On | 2014662 | |
| Guilherme de Almeida Suckevicz | 2021-10-15 18:28:34 UTC | Blocks | 2014663 | |
| Todd Cullum | 2021-10-18 19:31:41 UTC | Depends On | 2015194, 2015193 | |
| Severity | medium | low | ||
| Priority | medium | low | ||
| Todd Cullum | 2021-10-18 20:59:31 UTC | Fixed In Version | vim 8.2.3489 | |
| Todd Cullum | 2021-10-21 20:00:16 UTC | Doc Text | There's an out-of-bounds read flaw in Vim's ex_docmd.c. An attacker who is capable of tricking a user into opening a specially crafted file could trigger an out-of-bounds read on a memmove operation, potentially causing an impact to application availability. | |
| Red Hat Bugzilla | 2022-02-22 06:37:23 UTC | CC | jnakfour | |
| Red Hat Bugzilla | 2022-10-08 04:27:51 UTC | CC | gghezzo | |
| Red Hat Bugzilla | 2023-07-07 08:34:06 UTC | Assignee | security-response-team | nobody |
Back to bug 2014661