First published: Sat Apr 29 2023(Updated: )
Vim. Multiple issues were addressed by updating Vim.
Credit: CVE-2023-2426 CVE-2023-2609 CVE-2023-2610 CVE-2023-2426 CVE-2023-2609 CVE-2023-2610 CVE-2023-2426 CVE-2023-2609 CVE-2023-2610 security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
<13.5 | 13.5 | |
<12.6.8 | 12.6.8 | |
Apple macOS Big Sur | <11.7.9 | 11.7.9 |
Vim Vim | <9.0.1499 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-2426 is a vulnerability in the GitHub repository vim/vim prior to version 9.0.1499. It allows for the use of an out-of-range pointer offset.
CVE-2023-2426 has a severity rating of medium with a CVSS score of 5.5.
CVE-2023-2426 affects Vim versions prior to 9.0.1499, allowing for the use of an out-of-range pointer offset.
To fix CVE-2023-2426, update your Vim software to version 9.0.1499 or later.
You can find more information about CVE-2023-2426 at the following references: [GitHub Commit](https://github.com/vim/vim/commit/caf642c25de526229264cab9425e7c9979f3509b), [Huntr Bounty](https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425), [Fedora Mailing List](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LOJP6M7ZTKZQYOGVOOAY6TIE6ACBJL55/)