• CVE-2023-48235

发布时间: 2023年12月1日

修改时间: 2024年10月31日

概要

Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause anoverflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Network Local
CVSS评分 4.3 2.8
Attack Complexity Low Low
Privileges Required None Low
Scope Unchanged Unchanged
Integrity None None
User Interaction Required Required
Availability Low Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2023-1826 vim security update 2023年12月1日
KylinSec-SA-2023-1827 vim security update 2023年12月1日
KylinSec-SA-2023-1828 vim security update 2023年12月1日
KylinSec-SA-2023-2324 vim security update 2023年12月1日

影响产品

产品 状态
KY3.4-4A vim Fixed
KY3.4-5A vim Fixed
KY3.5.1 vim Fixed
KY3.5.2 vim Fixed