Back to bug 2119043

Who When What Removed Added
TEJ RATHI 2022-08-17 10:59:03 UTC Depends On 2119045
TEJ RATHI 2022-08-17 11:02:59 UTC CC jburrell
TEJ RATHI 2022-08-17 11:05:50 UTC Blocks 2119047
Guilherme de Almeida Suckevicz 2022-08-29 17:50:12 UTC Depends On 2122297
Guilherme de Almeida Suckevicz 2022-08-29 18:17:55 UTC Doc Text A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.
RaTasha Tillery-Smith 2022-08-29 19:10:42 UTC Doc Text A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory. A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory.
Red Hat Bugzilla 2023-07-07 08:28:19 UTC Assignee security-response-team nobody

Back to bug 2119043