« List of all CVEs

CVE-2023-48233

overflow with count for :s command in vim

Published: 11/16/2023 Last updated: 2/13/2025 Reserved: 11/13/2023

Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA assigner: GitHub_M (a0819718-46f1-4df5-94e2-005712e83aaa) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 2.8 Low CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

Opam packages affected (1)

conf-vim

Products affected (1)

Product Vendor Version
vim vim 2.0

References (14)