Back to bug 2161349
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2023-01-16 16:54:09 UTC | Blocks | 2159622 | |
| Guilherme de Almeida Suckevicz | 2023-01-16 17:11:48 UTC | Depends On | 2161353 | |
| Guilherme de Almeida Suckevicz | 2023-01-16 17:45:16 UTC | Doc Text | An out-of-bounds write was found in Vim in the do_string_sub function in the eval.c file. The issue occurs because of an invalid memory access due to an missing check of the return value of the vim_regsub function when specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the out-of-bounds write, causing the application to crash. | |
| Guilherme de Almeida Suckevicz | 2023-01-16 18:29:56 UTC | Depends On | 2161374, 2161375 | |
| Paige Jung | 2023-01-16 19:19:13 UTC | Doc Text | An out-of-bounds write was found in Vim in the do_string_sub function in the eval.c file. The issue occurs because of an invalid memory access due to an missing check of the return value of the vim_regsub function when specially crafted input is processed. This flaw allows an attacker who can trick an user into opening a specially crafted file into triggering the out-of-bounds write, causing the application to crash. | An out-of-bounds write flaw was found in Vim, in the do_string_sub function in the eval.c file. The issue occurs because of an invalid memory access due to a missing check of the return value of the vim_regsub function when a specially crafted input is processed. This flaw allows an attacker who can trick a user into opening a specially crafted file to trigger the out-of-bounds write, causing the application to crash. |
| Red Hat Bugzilla | 2023-07-07 08:35:45 UTC | Assignee | security-response-team | nobody |
Back to bug 2161349