First published: Sat Mar 04 2023(Updated: )
Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <9.0.1378 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1175 is a vulnerability that involves an incorrect calculation of buffer size in the GitHub repository vim/vim prior to version 9.0.1378.
CVE-2023-1175 has a severity rating of high, with a severity value of 6.6.
The affected software for CVE-2023-1175 is Vim Vim version up to exclusive 9.0.1378.
To fix CVE-2023-1175, update to version 9.0.1378 or later of Vim Vim.
Yes, you can find references to CVE-2023-1175 in the following links: [link 1](https://github.com/vim/vim/commit/c99cbf8f289bdda5d4a77d7ec415850a520330ba), [link 2](https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e), and [link 3](https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html).