Back to bug 2055695

Who When What Removed Added
Sandipan Roy 2022-02-17 14:34:44 UTC CC michal.skrivanek, mperina, sbonazzo
Sandipan Roy 2022-02-17 14:35:38 UTC Blocks 2055698
TEJ RATHI 2022-02-21 08:18:49 UTC Fixed In Version vim 8.2.4407 vim 8.2.4428
TEJ RATHI 2022-02-21 08:30:40 UTC Depends On 2056432, 2056431
FrantiĊĦek Hrdina 2022-02-21 09:06:47 UTC CC fhrdina
TEJ RATHI 2022-02-22 08:14:05 UTC Doc Text A stack-based buffer overflow flaw was found in vim's ga_concat_shorten_esc() function of src/testing.c file. An attacker could exploit this vulnerability by tricking a user into opening a crafted file triggering a stack-overflow. This could lead to an application crash causing a denial of service.
RaTasha Tillery-Smith 2022-02-22 19:53:06 UTC Doc Text A stack-based buffer overflow flaw was found in vim's ga_concat_shorten_esc() function of src/testing.c file. An attacker could exploit this vulnerability by tricking a user into opening a crafted file triggering a stack-overflow. This could lead to an application crash causing a denial of service. A stack-based buffer overflow flaw was found in vim's ga_concat_shorten_esc() function of src/testing.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a stack-overflow. This issue can lead to an application crash, causing a denial of service.
Sandro Bonazzola 2022-11-18 15:40:07 UTC CC sbonazzo
Red Hat Bugzilla 2023-07-07 08:31:43 UTC Assignee security-response-team nobody

Back to bug 2055695