Back to bug 2129835

Who When What Removed Added
TEJ RATHI 2022-09-26 12:08:02 UTC Depends On 2129836
TEJ RATHI 2022-09-26 12:20:38 UTC Blocks 2129840
TEJ RATHI 2022-10-06 12:56:47 UTC Doc Text A stack based buffer overflow vulnerability was found in Vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory.
RaTasha Tillery-Smith 2022-10-06 12:58:46 UTC Doc Text A stack based buffer overflow vulnerability was found in Vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory. A stack-based buffer overflow vulnerability was found in vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory.
TEJ RATHI 2022-10-06 14:09:56 UTC Depends On 2132748
TEJ RATHI 2022-10-06 14:11:53 UTC Depends On 2132750
Red Hat Bugzilla 2023-07-07 08:28:41 UTC Assignee security-response-team nobody

Back to bug 2129835