Back to bug 2176457
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2023-03-08 12:59:13 UTC | Depends On | 2176458 | |
| Pedro Sampaio | 2023-03-08 12:59:25 UTC | Blocks | 2176460 | |
| TEJ RATHI | 2023-03-14 05:48:05 UTC | Depends On | 2177976, 2177975 | |
| TEJ RATHI | 2023-03-15 10:28:55 UTC | Doc Text | There is an incorrect calculation of buffer size issue found in Vim's yank_copy_line() function of the register.c file. This flaw allows illegal memory access when using virtual editing as "startspaces" goes negative. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an issue that causes an application to crash leading to a denial of service, corrupting memory and possibly executing code. | |
| RaTasha Tillery-Smith | 2023-03-15 12:37:50 UTC | Doc Text | There is an incorrect calculation of buffer size issue found in Vim's yank_copy_line() function of the register.c file. This flaw allows illegal memory access when using virtual editing as "startspaces" goes negative. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an issue that causes an application to crash leading to a denial of service, corrupting memory and possibly executing code. | A flaw was found in Vim. There is an incorrect calculation of buffer size issue found in Vim's yank_copy_line() function of the register.c file. This flaw allows illegal memory access when using virtual editing as "startspaces" goes negative. An attacker can trick a user into opening a specially crafted file, triggering an issue that causes an application to crash leading to a denial of service, corrupting memory, and possibly executing code. |
| Red Hat Bugzilla | 2023-07-07 08:30:53 UTC | Assignee | security-response-team | nobody |
Back to bug 2176457