Back to bug 2124208
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-09-05 09:25:58 UTC | Depends On | 2124209 | |
| TEJ RATHI | 2022-09-05 09:27:56 UTC | Blocks | 2124188 | |
| TEJ RATHI | 2022-09-05 10:59:58 UTC | Doc Text | A heap use-after-free vulnerability was found in Vim's get_next_valid_entry() function of the src/quickfix.c file. This flaw occurs because vim is using freed memory when location list changed in autocmd. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory. | |
| TEJ RATHI | 2022-09-05 11:01:20 UTC | Depends On | 2124236 | |
| RaTasha Tillery-Smith | 2022-09-06 14:41:21 UTC | Doc Text | A heap use-after-free vulnerability was found in Vim's get_next_valid_entry() function of the src/quickfix.c file. This flaw occurs because vim is using freed memory when location list changed in autocmd. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory. | A heap use-after-free vulnerability was found in vim's get_next_valid_entry() function of the src/quickfix.c file. The issue occurs because vim is using freed memory when the location list is changed in autocmd. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory. |
| Red Hat Bugzilla | 2023-07-07 08:30:33 UTC | Assignee | security-response-team | nobody |
Back to bug 2124208