Back to bug 2161348
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2023-01-16 16:54:09 UTC | Blocks | 2159622 | |
| Guilherme de Almeida Suckevicz | 2023-01-16 17:05:00 UTC | Depends On | 2161352 | |
| Guilherme de Almeida Suckevicz | 2023-01-16 17:39:33 UTC | Doc Text | A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash. | |
| Paige Jung | 2023-01-16 17:56:41 UTC | Doc Text | A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash. | A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash. |
| Guilherme de Almeida Suckevicz | 2023-01-16 18:29:10 UTC | Depends On | 2161373 | |
| Red Hat Bugzilla | 2023-07-07 08:32:33 UTC | Assignee | security-response-team | nobody |
Back to bug 2161348