{"schema_version":"1.7.2","id":"OESA-2023-1902","modified":"2023-12-08T11:06:27Z","published":"2023-12-08T11:06:27Z","upstream":["CVE-2023-48706"],"summary":"vim security update","details":"Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor \u0026apos;Vi\u0026apos;, with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.\r\n\r\nSecurity Fix(es):\r\n\r\nVim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.(CVE-2023-48706)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS","name":"vim","purl":"pkg:rpm/openEuler/vim\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0-23.oe2203"}]}],"ecosystem_specific":{"aarch64":["vim-enhanced-9.0-23.oe2203.aarch64.rpm","vim-debugsource-9.0-23.oe2203.aarch64.rpm","vim-debuginfo-9.0-23.oe2203.aarch64.rpm","vim-X11-9.0-23.oe2203.aarch64.rpm","vim-common-9.0-23.oe2203.aarch64.rpm","vim-minimal-9.0-23.oe2203.aarch64.rpm"],"noarch":["vim-filesystem-9.0-23.oe2203.noarch.rpm"],"src":["vim-9.0-23.oe2203.src.rpm"],"x86_64":["vim-minimal-9.0-23.oe2203.x86_64.rpm","vim-common-9.0-23.oe2203.x86_64.rpm","vim-debuginfo-9.0-23.oe2203.x86_64.rpm","vim-debugsource-9.0-23.oe2203.x86_64.rpm","vim-enhanced-9.0-23.oe2203.x86_64.rpm","vim-X11-9.0-23.oe2203.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1902"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48706"}],"database_specific":{"severity":"Low"}}