Integer Overflow or Wraparound Affecting vim-data-common package, versions <9.0.2103-150000.5.57.1


Severity

Recommended
low

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Integer Overflow or Wraparound vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES153-VIMDATACOMMON-6091182
  • published28 Nov 2023
  • disclosed27 Nov 2023

Introduced: 27 Nov 2023

CVE-2023-46246  (opens in a new tab)
CWE-190  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade SLES:15.3 vim-data-common to version 9.0.2103-150000.5.57.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream vim-data-common package and not the vim-data-common package as distributed by SLES. See How to fix? for SLES:15.3 relevant fixed versions and status.

Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function ga_grow_inner in in the file src/alloc.c at line 748, which is freed in the file src/ex_docmd.c in the function do_cmdline at line 1010 and then used again in src/cmdhist.c at line 759. When using the :history command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.

CVSS Base Scores

version 3.1