Back to bug 2055695
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Sandipan Roy | 2022-02-17 14:34:44 UTC | CC | michal.skrivanek, mperina, sbonazzo | |
| Sandipan Roy | 2022-02-17 14:35:38 UTC | Blocks | 2055698 | |
| TEJ RATHI | 2022-02-21 08:18:49 UTC | Fixed In Version | vim 8.2.4407 | vim 8.2.4428 |
| TEJ RATHI | 2022-02-21 08:30:40 UTC | Depends On | 2056432, 2056431 | |
| FrantiĊĦek Hrdina | 2022-02-21 09:06:47 UTC | CC | fhrdina | |
| TEJ RATHI | 2022-02-22 08:14:05 UTC | Doc Text | A stack-based buffer overflow flaw was found in vim's ga_concat_shorten_esc() function of src/testing.c file. An attacker could exploit this vulnerability by tricking a user into opening a crafted file triggering a stack-overflow. This could lead to an application crash causing a denial of service. | |
| RaTasha Tillery-Smith | 2022-02-22 19:53:06 UTC | Doc Text | A stack-based buffer overflow flaw was found in vim's ga_concat_shorten_esc() function of src/testing.c file. An attacker could exploit this vulnerability by tricking a user into opening a crafted file triggering a stack-overflow. This could lead to an application crash causing a denial of service. | A stack-based buffer overflow flaw was found in vim's ga_concat_shorten_esc() function of src/testing.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a stack-overflow. This issue can lead to an application crash, causing a denial of service. |
| Sandro Bonazzola | 2022-11-18 15:40:07 UTC | CC | sbonazzo | |
| Red Hat Bugzilla | 2023-07-07 08:31:43 UTC | Assignee | security-response-team | nobody |
Back to bug 2055695