Back to bug 2119043
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-08-17 10:59:03 UTC | Depends On | 2119045 | |
| TEJ RATHI | 2022-08-17 11:02:59 UTC | CC | jburrell | |
| TEJ RATHI | 2022-08-17 11:05:50 UTC | Blocks | 2119047 | |
| Guilherme de Almeida Suckevicz | 2022-08-29 17:50:12 UTC | Depends On | 2122297 | |
| Guilherme de Almeida Suckevicz | 2022-08-29 18:17:55 UTC | Doc Text | A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory. | |
| RaTasha Tillery-Smith | 2022-08-29 19:10:42 UTC | Doc Text | A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory. | A use-after-free vulnerability was found in Vim in the string_quote function in the strings.c file. This issue occurs because an already freed memory is used when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the use-after-free, causing the application to crash, possibly executing code and corrupting memory. |
| Red Hat Bugzilla | 2023-07-07 08:28:19 UTC | Assignee | security-response-team | nobody |
Back to bug 2119043