StackPatch is liveSee product

Back to CVE digest
CVE-2023-48235 · cross-distro fix matrix

CVE-2023-48235: Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction

Affects 1 Linux release across 1 (distro × package) combinations.

Fix per ecosystem

Each block below is a distro release where CVE-2023-48235 has a known fix. Run the listed command on that distro to remediate.

Debian trixie

Source: Debian Security Tracker

  • vim→ fixed in2:9.0.2116-1urgency: unimportant
    sudo apt-get install --only-upgrade -y vim
Are YOU affected by CVE-2023-48235?

5-second check on your actual server. Reads /etc/os-release, uname -r, and the distro's package manager; matches against this same cross-source index live.

curl https://mindsparkstack.com/scan.sh | bash
Continuous monitoring beats manual checking

CVE-2023-48235dropped silently in your distro's update channel. Every new CVE is the same story. StackPatch runs the matcher hourly against all 5 sources and emails the exact remediation when something new applies to one of your servers. $99 lifetime, 50 founder seats, 30-day refund.

See StackPatch ($99 lifetime)