Back to bug 2029513
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-12-06 16:51:13 UTC | Depends On | 2029514 | |
| Guilherme de Almeida Suckevicz | 2021-12-06 16:51:21 UTC | Blocks | 2029515 | |
| Todd Cullum | 2021-12-16 18:38:35 UTC | Depends On | 2029783, 2029776 | |
| Severity | medium | low | ||
| Priority | medium | low | ||
| Todd Cullum | 2021-12-16 20:47:54 UTC | Fixed In Version | vim 8.2.3741 | |
| Red Hat Bugzilla | 2022-02-22 06:37:11 UTC | CC | jnakfour | |
| Red Hat Bugzilla | 2022-10-08 04:27:45 UTC | CC | gghezzo | |
| Red Hat Bugzilla | 2023-07-07 08:31:33 UTC | Assignee | security-response-team | nobody |
| TEJ RATHI | 2023-07-11 08:43:28 UTC | Doc Text | A heap use-after-free issue was discovered in Vim's ex_open() function in src/ex_docmd.c file. An attacker can trick the victim to open a specially crafted file, trigger a use-after-free error, allowing an attacker to compromise vulnerable system and execute arbitrary code. | |
| RaTasha Tillery-Smith | 2023-07-11 13:29:48 UTC | Doc Text | A heap use-after-free issue was discovered in Vim's ex_open() function in src/ex_docmd.c file. An attacker can trick the victim to open a specially crafted file, trigger a use-after-free error, allowing an attacker to compromise vulnerable system and execute arbitrary code. | A heap use-after-free flaw was found in Vim's ex_open() function in src/ex_docmd.c file. This flaw allows an attacker to trick the victim into opening a specially crafted file that triggers a use-after-free error, allowing the attacker to compromise the system and execute arbitrary code. |
Back to bug 2029513