vim is vulnerable to denial of service attack. The vulnerability exist in the vim_regexec_string
function in regexp.c
due to null point deferences, allows attackers to cause a system crash via a crafted input.
seclists.org/fulldisclosure/2022/Oct/28
seclists.org/fulldisclosure/2022/Oct/41
github.com/advisories/GHSA-rx8p-hg5g-g9hg
github.com/vim/vim/commit/a59f2dfd0cf9ee1a584d3de5b7c2d47648e79060
github.com/vim/vim/commit/a59f2dfd0cf9ee1a584d3de5b7c2d47648e79060
huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385
huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385/
lists.fedoraproject.org/archives/list/[email protected]/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/
lists.fedoraproject.org/archives/list/[email protected]/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/
lists.fedoraproject.org/archives/list/[email protected]/message/ODXVYZC5Z4XRRZK7CK6B6IURYVYHA25U/
security-tracker.debian.org/tracker/CVE-2022-1674
security.gentoo.org/glsa/202208-32
security.gentoo.org/glsa/202305-16
support.apple.com/kb/HT213488