vim, edge is vulnerable to use-after-free. The vulnerability exists in qf_fill_buffer
function in quickfix.c
because user input not properly sanitization which allows an attacker to inject and execute malicious code into the system into the system.
github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb
huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5
lists.fedoraproject.org/archives/list/[email protected]/message/RY3GEN2Q46ZJKSNHTN2XB6B3VAJBEILN/
lists.fedoraproject.org/archives/list/[email protected]/message/VHJ6LCLHGGVI2U6ZHXHTZ2PYP4STC23N/
lists.fedoraproject.org/archives/list/[email protected]/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
secdb.alpinelinux.org/edge/main.yaml