Updated w3m packages fix security vulnerabilities
Publication date: 01 Apr 2024Modification date: 01 Apr 2024
Type: security
Affected Mageia releases : 9
CVE: CVE-2023-38252 , CVE-2023-38253 , CVE-2023-4255
Description
An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. (CVE-2023-38252) An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. (CVE-2023-38253) An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition. (CVE-2023-4255)
References
- https://bugs.mageia.org/show_bug.cgi?id=33027
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38252
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4255
SRPMS
9/core
- w3m-0.5.3-13.git20230121.1.mga9