Back to bug 2124157
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Sandipan Roy | 2022-09-05 05:07:45 UTC | CC | gchamoul, karsten | |
| Sandipan Roy | 2022-09-05 05:08:31 UTC | Depends On | 2124158 | |
| Sandipan Roy | 2022-09-05 05:38:05 UTC | Blocks | 2124159 | |
| TEJ RATHI | 2022-09-13 06:48:33 UTC | Doc Text | A use-after-free vulnerability was found in vim's do_cmdline() function of the src/ex_docmd.c file. The issue triggers when an invalid line number on :for is ignored. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering use-after-free that causes an application to crash, possibly executing code and corrupting memory. | |
| Summary | CVE-2022-3099 vim: Use After Free in ex_docmd.c | CVE-2022-3099 vim: Use After Free in do_cmdline() in ex_docmd.c | ||
| Fixed In Version | vim 9.0.0360 | |||
| TEJ RATHI | 2022-09-13 06:49:10 UTC | Depends On | 2126298 | |
| Red Hat Bugzilla | 2023-07-07 08:27:52 UTC | Assignee | security-response-team | nobody |
Back to bug 2124157