Back to bug 2148991
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| TEJ RATHI | 2022-11-28 12:49:15 UTC | CC | zdohnal | |
| TEJ RATHI | 2022-11-28 12:49:55 UTC | Depends On | 2148992 | |
| TEJ RATHI | 2022-11-28 12:50:15 UTC | Blocks | 2148821 | |
| TEJ RATHI | 2022-12-26 04:49:56 UTC | Doc Text | A heap-based buffer overflow vulnerability was found in Vim due to invalid memory access in substitute with function that goes to another file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory. | |
| TEJ RATHI | 2022-12-26 04:51:18 UTC | Depends On | 2156265 | |
| Paige Jung | 2023-01-03 13:34:53 UTC | Doc Text | A heap-based buffer overflow vulnerability was found in Vim due to invalid memory access in substitute with function that goes to another file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory. | A heap-based buffer overflow vulnerability was found in Vim due to invalid memory access. This issue could allow an attacker to trick a user into opening a specially crafted file, triggering an out-of-bounds write that causes an application to crash, possibly executing code and corrupting memory. |
| Red Hat Bugzilla | 2023-07-07 08:28:29 UTC | Assignee | security-response-team | nobody |
Back to bug 2148991