Back to bug 2161348

Who When What Removed Added
Guilherme de Almeida Suckevicz 2023-01-16 16:54:09 UTC Blocks 2159622
Guilherme de Almeida Suckevicz 2023-01-16 17:05:00 UTC Depends On 2161352
Guilherme de Almeida Suckevicz 2023-01-16 17:39:33 UTC Doc Text A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash.
Paige Jung 2023-01-16 17:56:41 UTC Doc Text A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash. A heap-based buffer overflow was found in Vim in the msg_puts_printf function in the message.c file. The issue occurs because of an invalid memory access when calculating the length of a string when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file into triggering the heap-based buffer overflow, causing the application to crash.
Guilherme de Almeida Suckevicz 2023-01-16 18:29:10 UTC Depends On 2161373
Red Hat Bugzilla 2023-07-07 08:32:33 UTC Assignee security-response-team nobody

Back to bug 2161348