Back to bug 2112299
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-07-29 09:41:53 UTC | Depends On | 2112300 | |
| TEJ RATHI | 2022-07-29 09:43:38 UTC | CC | jburrell | |
| TEJ RATHI | 2022-07-29 09:44:11 UTC | CC | jburrell | |
| TEJ RATHI | 2022-07-29 09:44:32 UTC | Blocks | 2111161 | |
| TEJ RATHI | 2022-08-04 11:43:23 UTC | Comment | 0 | updated |
| TEJ RATHI | 2022-08-04 11:48:04 UTC | Fixed In Version | vim 9.0.0060 | |
| TEJ RATHI | 2022-08-04 11:48:38 UTC | Depends On | 2115312, 2115311 | |
| TEJ RATHI | 2022-09-06 07:54:02 UTC | Doc Text | A heap buffer overflow vulnerability was found in Vim's ins_compl_infercase_gettext() function of the src/insexpand.c file. This flaw occurs when vim tries to access uninitialized memory when completing long line. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap-based buffer overflow that causes an application to crash, possibly executing code and corrupting memory. | |
| RaTasha Tillery-Smith | 2022-09-06 14:30:42 UTC | Doc Text | A heap buffer overflow vulnerability was found in Vim's ins_compl_infercase_gettext() function of the src/insexpand.c file. This flaw occurs when vim tries to access uninitialized memory when completing long line. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap-based buffer overflow that causes an application to crash, possibly executing code and corrupting memory. | A heap buffer overflow vulnerability was found in vim's ins_compl_infercase_gettext() function of the src/insexpand.c file. This flaw occurs when vim tries to access uninitialized memory when completing a long line. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap-based buffer overflow that causes an application to crash, possibly executing code and corrupting memory. |
| Red Hat Bugzilla | 2023-07-07 08:35:30 UTC | Assignee | security-response-team | nobody |
Back to bug 2112299