Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2023-48233
HistoryNov 16, 2023 - 11:15 p.m.

CVE-2023-48233

2023-11-1623:15:08
Alpine Linux Development Team
security.alpinelinux.org
20
vim
command line
text editor
vulnerability
impact
upgrade
unix

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

41.8%

Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit ac6378773 which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.

OSVersionArchitecturePackageVersionFilename
Alpine3.18-mainnoarchvim= 9.0.2073-r0UNKNOWN
Alpine3.17-mainnoarchvim= 9.0.0999-r0UNKNOWN
Alpine3.15-mainnoarchvim= 8.2.4836-r1UNKNOWN
Alpine3.16-mainnoarchvim= 8.2.5000-r1UNKNOWN

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

41.8%