Back to bug 2132558

Who When What Removed Added
TEJ RATHI 2022-10-06 07:24:04 UTC Depends On 2132559
TEJ RATHI 2022-10-06 07:31:53 UTC Blocks 2129840
TEJ RATHI 2022-10-06 11:15:32 UTC Doc Text A stack-based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. This flaw occurs due to the usage of negative array index with negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug causing an application to crash, possibly executing code and corrupting memory.
TEJ RATHI 2022-10-06 11:15:49 UTC Doc Text A stack-based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. This flaw occurs due to the usage of negative array index with negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug causing an application to crash, possibly executing code and corrupting memory. A stack based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. This flaw occurs due to the usage of negative array index with negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug causing an application to crash, possibly executing code and corrupting memory.
RaTasha Tillery-Smith 2022-10-06 12:54:03 UTC Doc Text A stack based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. This flaw occurs due to the usage of negative array index with negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug causing an application to crash, possibly executing code and corrupting memory. A stack-based buffer overflow vulnerability was found in Vim's win_redr_ruler() function of the src/drawscreen.c file. The issue occurs when using a negative array index with a negative width window. This flaw allows an attacker to trick a user into opening a specially crafted file, which triggers the bug, causing an application to crash, possibly executing code and corrupting memory.
TEJ RATHI 2022-10-06 14:10:14 UTC Depends On 2132748
Red Hat Bugzilla 2023-07-07 08:31:58 UTC Assignee security-response-team nobody

Back to bug 2132558