Mageia 2024-0105: w3m security update
Summary
An out-of-bounds read flaw was found in w3m, in the Strnew_size function
in Str.c. This issue may allow an attacker to cause a denial of service
through a crafted HTML file. (CVE-2023-38252)
An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str
function in indep.c. This issue may allow an attacker to cause a denial
of service through a crafted HTML file. (CVE-2023-38253)
An out-of-bounds write issue has been discovered in the backspace
handling of the checkType() function in etc.c within the W3M
application. This vulnerability is triggered by supplying a specially
crafted HTML file to the w3m binary. Exploitation of this flaw could
lead to application crashes, resulting in a denial of service condition.
(CVE-2023-4255)
References
- https://bugs.mageia.org/show_bug.cgi?id=33027
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38252
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4255
Resolution
MGASA-2024-0105 - Updated w3m packages fix security vulnerabilities
SRPMS
- 9/core/w3m-0.5.3-13.git20230121.1.mga9