vim is vulnerable to Denial of Service (DoS) attacks. NULL pointer dereference vulnerability in vim’s utfc_ptr2len() function in the mbyte.c file. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering an issue that causes an application to crash, leading to a denial of service.
git://git.launchpad.net/ubuntu-cve-tracker/tree/active/CVE-2023-1264
github.com/vim/vim/commit/7ac5023a5f1a37baafbe1043645f97ba3443d9f6
huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
lists.fedoraproject.org/archives/list/[email protected]/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
lists.fedoraproject.org/archives/list/[email protected]/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
lists.fedoraproject.org/archives/list/[email protected]/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/