vim:edge is vulnerable to out of bounds read. The vulnerability exists in the suggest_trie_walk
function from spellsuggest.c
which allows an attacker to cause out of bound reads.
github.com/vim/vim/commit/5e59ea54c0c37c2f84770f068d95280069828774
huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
lists.fedoraproject.org/archives/list/[email protected]/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
lists.fedoraproject.org/archives/list/[email protected]/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
secdb.alpinelinux.org/edge/main.yaml
security.gentoo.org/glsa/202208-32
security.gentoo.org/glsa/202305-16