DEBIAN-CVE-2023-48236

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2023-48236
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-48236.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-48236
Upstream
Published
2023-11-16T23:15:09Z
Modified
2025-09-19T06:16:48Z
Summary
[none]
Details

Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit 73b2d379 which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Debian:13 / vim

Package

Name
vim
Purl
pkg:deb/debian/vim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.0.2116-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:14 / vim

Package

Name
vim
Purl
pkg:deb/debian/vim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.0.2116-1

Ecosystem specific

{
    "urgency": "unimportant"
}