Summary: | <www-client/w3m-0.5.3-r9: Multiple vulnerabilities (CVE-2016-{9422,9423,9424,9425,9426,9428,9429,9430,9431,9432,9433,9434,9437,9438,9439,9440,9441,9442,9443}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | cjk |
Priority: | Normal | Flags: | kensington:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://seclists.org/oss-sec/2016/q4/452 | ||
Whiteboard: | A2 [glsa cve cleanup] | ||
Package list: |
=www-client/w3m-0.5.3-r9
|
Runtime testing required: | --- |
Description
Thomas Deutschmann (RETIRED)
![]() @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not. For completeness: the package mentioned in the bugreport is the debian's fork of w3m, available at https://github.com/tats/w3m. Our www-client/w3m refers to https://sourceforge.net/projects/w3m/files/w3m/w3m-0.5.3/ which is dead upstream. I'm not sure at all that all vulnerabilities and all patches applies to the original w3m. See the confirmed bug 576514. Looks like the Gentoo maintainer is aware of the changed upstream. pushed/fixed at www-client/w3m-0.5.3-r9, thansk https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=8980adf0be95c6fa394f71a2b7ff63b475c87aa5 @ Arches, please test and mark stable: =www-client/w3m-0.5.3-r9 Stable on alpha. While make the glsa please consider to add the following CVEs: http://marc.info/?l=oss-security&m=147995099420114&w=2 amd64 stable x86 stable sparc stable ia64 stable ppc stable ppc64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. CVE-2016-9443 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9443): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. CVE-2016-9442 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9442): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause memory corruption in certain conditions via a crafted HTML page. CVE-2016-9441 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9441): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. CVE-2016-9440 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9440): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. CVE-2016-9439 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9439): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page. CVE-2016-9438 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9438): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. CVE-2016-9437 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9437): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page. CVE-2016-9434 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9434): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. CVE-2016-9433 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9433): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (out-of-bounds array access) via a crafted HTML page. CVE-2016-9432 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9432): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (memory corruption, segmentation fault, and crash) via a crafted HTML page. CVE-2016-9431 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9431): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page. CVE-2016-9430 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9430): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. CVE-2016-9429 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9429): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Buffer overflow in the formUpdateBuffer function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page. CVE-2016-9428 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9428): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page. CVE-2016-9426 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9426): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Integer overflow vulnerability in the renderTable function in w3m allows remote attackers to cause a denial of service (OOM) and possibly execute arbitrary code due to bdwgc's bug (CVE-2016-9427) via a crafted HTML page. CVE-2016-9425 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9425): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page. CVE-2016-9424 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9424): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page. CVE-2016-9423 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9423): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page. CVE-2016-9422 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9422): An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. The feed_table_tag function in w3m doesn't properly validate the value of table span, which allows remote attackers to cause a denial of service (stack and/or heap buffer overflow) and possibly execute arbitrary code via a crafted HTML page. This issue was resolved and addressed in GLSA 201701-08 at https://security.gentoo.org/glsa/201701-08 by GLSA coordinator Thomas Deutschmann (whissi). Re-opening for cleanup. @ Maintainer(s): Please drop <www-client/w3m-0.5.3-r9 all old vulnerable versions are dropped. https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e93356f2a082efc77909d75820aba87dacd20e0b |