Back to bug 2132558
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-10-06 07:24:04 UTC | Depends On | 2132559 | |
| TEJ RATHI | 2022-10-06 07:31:53 UTC | Blocks | 2129840 | |
| TEJ RATHI | 2022-10-06 11:15:32 UTC | Doc Text | A stack-based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. This flaw occurs due to the usage of negative array index with negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug causing an application to crash, possibly executing code and corrupting memory. | |
| TEJ RATHI | 2022-10-06 11:15:49 UTC | Doc Text | A stack-based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. This flaw occurs due to the usage of negative array index with negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug causing an application to crash, possibly executing code and corrupting memory. | A stack based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. This flaw occurs due to the usage of negative array index with negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug causing an application to crash, possibly executing code and corrupting memory. |
| RaTasha Tillery-Smith | 2022-10-06 12:54:03 UTC | Doc Text | A stack based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. This flaw occurs due to the usage of negative array index with negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug causing an application to crash, possibly executing code and corrupting memory. | A stack-based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. The issue occurs when using a negative array index with a negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug, causing an application to crash, possibly executing code and corrupting memory. |
| TEJ RATHI | 2022-10-06 14:10:14 UTC | Depends On | 2132748 | |
| Red Hat Bugzilla | 2023-07-07 08:31:58 UTC | Assignee | security-response-team | nobody |
Back to bug 2132558