ALT-BU-2015-2763-2
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-11
CVE-2010-2074
istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044401.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://osvdb.org/65538
- http://secunia.com/advisories/40134
- http://secunia.com/advisories/40733
- http://www.openwall.com/lists/oss-security/2010/06/14/4
- http://www.redhat.com/support/errata/RHSA-2010-0565.html
- http://www.securityfocus.com/bid/40837
- http://www.securitytracker.com/id?1024252
- http://www.vupen.com/english/advisories/2010/1467
- http://www.vupen.com/english/advisories/2010/1879
- http://www.vupen.com/english/advisories/2010/1928
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044401.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://osvdb.org/65538
- http://secunia.com/advisories/40134
- http://secunia.com/advisories/40733
- http://www.openwall.com/lists/oss-security/2010/06/14/4
- http://www.redhat.com/support/errata/RHSA-2010-0565.html
- http://www.securityfocus.com/bid/40837
- http://www.securitytracker.com/id?1024252
- http://www.vupen.com/english/advisories/2010/1467
- http://www.vupen.com/english/advisories/2010/1879
- http://www.vupen.com/english/advisories/2010/1928
Modified: 2025-02-08
CVE-2023-38252
An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.
- https://access.redhat.com/security/cve/CVE-2023-38252
- https://bugzilla.redhat.com/show_bug.cgi?id=2222775
- https://github.com/tats/w3m/issues/270
- https://access.redhat.com/security/cve/CVE-2023-38252
- https://bugzilla.redhat.com/show_bug.cgi?id=2222775
- https://github.com/tats/w3m/issues/270
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
Modified: 2024-11-21
CVE-2023-38253
An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.
- https://access.redhat.com/security/cve/CVE-2023-38253
- https://bugzilla.redhat.com/show_bug.cgi?id=2222779
- https://github.com/tats/w3m/issues/271
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
- https://access.redhat.com/security/cve/CVE-2023-38253
- https://bugzilla.redhat.com/show_bug.cgi?id=2222779
- https://github.com/tats/w3m/issues/271
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
Modified: 2024-11-21
CVE-2023-4255
An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition.
- https://bugzilla.redhat.com/show_bug.cgi?id=2255207
- https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3
- https://github.com/tats/w3m/issues/268
- https://github.com/tats/w3m/pull/273
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
- https://bugzilla.redhat.com/show_bug.cgi?id=2255207
- https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3
- https://github.com/tats/w3m/issues/268
- https://github.com/tats/w3m/pull/273
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
Closed bugs
Собрать psi-plus v0.16.361