Back to bug 2129835
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-09-26 12:08:02 UTC | Depends On | 2129836 | |
| TEJ RATHI | 2022-09-26 12:20:38 UTC | Blocks | 2129840 | |
| TEJ RATHI | 2022-10-06 12:56:47 UTC | Doc Text | A stack based buffer overflow vulnerability was found in Vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory. | |
| RaTasha Tillery-Smith | 2022-10-06 12:58:46 UTC | Doc Text | A stack based buffer overflow vulnerability was found in Vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory. | A stack-based buffer overflow vulnerability was found in vim's ex_finally() function of the src/ex_eval.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a bug that causes an application to crash, possibly executing code and corrupting memory. |
| TEJ RATHI | 2022-10-06 14:09:56 UTC | Depends On | 2132748 | |
| TEJ RATHI | 2022-10-06 14:11:53 UTC | Depends On | 2132750 | |
| Red Hat Bugzilla | 2023-07-07 08:28:41 UTC | Assignee | security-response-team | nobody |
Back to bug 2129835