First published: Thu Nov 16 2023(Updated: )
Last updated 24 July 2024
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Vim | <9.0.2110 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
debian/vim | <=2:8.2.2434-3+deb11u1<=2:9.0.1378-2 | 2:9.1.0861-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48235 is a vulnerability in Vim that occurs when parsing relative ex addresses, leading to an overflow.
The impact of CVE-2023-48235 is low, with limited user interaction required.
Vim versions up to and excluding 9.0.2110 and Fedora 39 are affected by CVE-2023-48235.
To fix CVE-2023-48235, update Vim to version 9.0.2110 or higher.
More information about CVE-2023-48235 can be found in the references provided: https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g, https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200, http://www.openwall.com/lists/oss-security/2023/11/16/1