ALT-BU-2020-4100-2
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2019-01542
Уязвимость функции jQuery.extend() библиотеки jQuery, позволяющая нарушителю вызвать отказ в обслуживании, выполнить произвольный JavaScript-код или повысить свои привилегии
BDU:2019-04254
Уязвимость функции jQuery.extend (true, {}, ...) библиотеки jQuery, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2020-04949
Уязвимость библиотеки jQuery, существующая из-за недостаточной очистки предоставленных пользователем данных при передаче элементов <option>, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
BDU:2020-05190
Уязвимость библиотеки jQuery, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2019-11358
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
- openSUSE-SU-2019:1839
- openSUSE-SU-2019:1839
- openSUSE-SU-2019:1872
- openSUSE-SU-2019:1872
- http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html
- http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html
- http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
- http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html
- http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html
- http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html
- 20190510 dotCMS v5.1.1 Vulnerabilities
- 20190510 dotCMS v5.1.1 Vulnerabilities
- 20190510 dotCMS v5.1.1 HTML Injection & XSS Vulnerability
- 20190510 dotCMS v5.1.1 HTML Injection & XSS Vulnerability
- 20190510 Re: dotCMS v5.1.1 HTML Injection & XSS Vulnerability
- 20190510 Re: dotCMS v5.1.1 HTML Injection & XSS Vulnerability
- [oss-security] 20190603 Django: CVE-2019-12308 AdminURLFieldWidget XSS (plus patched bundled jQuery for CVE-2019-11358)
- [oss-security] 20190603 Django: CVE-2019-12308 AdminURLFieldWidget XSS (plus patched bundled jQuery for CVE-2019-11358)
- 108023
- 108023
- RHBA-2019:1570
- RHBA-2019:1570
- RHSA-2019:1456
- RHSA-2019:1456
- RHSA-2019:2587
- RHSA-2019:2587
- RHSA-2019:3023
- RHSA-2019:3023
- RHSA-2019:3024
- RHSA-2019:3024
- https://backdropcms.org/security/backdrop-sa-core-2019-009
- https://backdropcms.org/security/backdrop-sa-core-2019-009
- https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
- https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/
- https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b
- https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b
- https://github.com/jquery/jquery/pull/4333
- https://github.com/jquery/jquery/pull/4333
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601
- [airflow-commits] 20190428 [GitHub] [airflow] feng-tao commented on issue #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [airflow-commits] 20190428 [GitHub] [airflow] feng-tao commented on issue #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities
- [drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities
- [airflow-commits] 20190428 [GitHub] [airflow] XD-DENG merged pull request #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [airflow-commits] 20190428 [GitHub] [airflow] XD-DENG merged pull request #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [airflow-commits] 20190428 [GitHub] [airflow] XD-DENG commented on issue #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [airflow-commits] 20190428 [GitHub] [airflow] XD-DENG commented on issue #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [airflow-commits] 20190428 [GitHub] [airflow] codecov-io commented on issue #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [airflow-commits] 20190428 [GitHub] [airflow] codecov-io commented on issue #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities
- [drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities
- [airflow-commits] 20190428 [GitHub] [airflow] feng-tao opened a new pull request #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [airflow-commits] 20190428 [GitHub] [airflow] feng-tao opened a new pull request #5197: [AIRFLOW-XXX] Fix CVE-2019-11358
- [roller-commits] 20190820 [jira] [Created] (ROL-2150) Fix Js security vulnerabilities detected using retire js
- [roller-commits] 20190820 [jira] [Created] (ROL-2150) Fix Js security vulnerabilities detected using retire js
- [nifi-commits] 20191113 svn commit: r1869773 - /nifi/site/trunk/security.html
- [nifi-commits] 20191113 svn commit: r1869773 - /nifi/site/trunk/security.html
- [drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities
- [drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities
- [flink-issues] 20200518 [jira] [Commented] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-issues] 20200518 [jira] [Commented] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-issues] 20200520 [jira] [Closed] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-issues] 20200520 [jira] [Closed] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [syncope-dev] 20200423 Jquery version on 2.1.x/2.0.x
- [syncope-dev] 20200423 Jquery version on 2.1.x/2.0.x
- [flink-issues] 20200518 [jira] [Assigned] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-issues] 20200518 [jira] [Assigned] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-dev] 20200513 [jira] [Created] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-dev] 20200513 [jira] [Created] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [storm-dev] 20200708 [GitHub] [storm] Crim opened a new pull request #3305: [STORM-3553] Upgrade jQuery from 1.11.1 to 3.5.1
- [storm-dev] 20200708 [GitHub] [storm] Crim opened a new pull request #3305: [STORM-3553] Upgrade jQuery from 1.11.1 to 3.5.1
- [flink-issues] 20200518 [jira] [Updated] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-issues] 20200518 [jira] [Updated] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-issues] 20200513 [jira] [Created] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [flink-issues] 20200513 [jira] [Created] (FLINK-17675) Resolve CVE-2019-11358 from jquery
- [nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html
- [nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html
- [debian-lts-announce] 20190506 [SECURITY] [DLA 1777-1] jquery security update
- [debian-lts-announce] 20190506 [SECURITY] [DLA 1777-1] jquery security update
- [debian-lts-announce] 20190520 [SECURITY] [DLA 1797-1] drupal7 security update
- [debian-lts-announce] 20190520 [SECURITY] [DLA 1797-1] drupal7 security update
- [debian-lts-announce] 20200224 [SECURITY] [DLA 2118-1] otrs2 security update
- [debian-lts-announce] 20200224 [SECURITY] [DLA 2118-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- FEDORA-2019-1a3edd7e8a
- FEDORA-2019-1a3edd7e8a
- FEDORA-2019-eba8e44ee6
- FEDORA-2019-eba8e44ee6
- FEDORA-2019-7eaf0bbe7c
- FEDORA-2019-7eaf0bbe7c
- FEDORA-2019-a06dffab1c
- FEDORA-2019-a06dffab1c
- FEDORA-2019-2a0ce0c58c
- FEDORA-2019-2a0ce0c58c
- FEDORA-2019-f563e66380
- FEDORA-2019-f563e66380
- 20190421 [SECURITY] [DSA 4434-1] drupal7 security update
- 20190421 [SECURITY] [DSA 4434-1] drupal7 security update
- 20190612 [SECURITY] [DSA 4460-1] mediawiki security update
- 20190612 [SECURITY] [DSA 4460-1] mediawiki security update
- 20190509 dotCMS v5.1.1 Vulnerabilities
- 20190509 dotCMS v5.1.1 Vulnerabilities
- https://security.netapp.com/advisory/ntap-20190919-0001/
- https://security.netapp.com/advisory/ntap-20190919-0001/
- https://snyk.io/vuln/SNYK-JS-JQUERY-174006
- https://snyk.io/vuln/SNYK-JS-JQUERY-174006
- https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1
- https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved-in-Junos-OS-21-2R1
- DSA-4434
- DSA-4434
- DSA-4460
- DSA-4460
- https://www.drupal.org/sa-core-2019-006
- https://www.drupal.org/sa-core-2019-006
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/
- https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/
- https://www.synology.com/security/advisory/Synology_SA_19_19
- https://www.synology.com/security/advisory/Synology_SA_19_19
- https://www.tenable.com/security/tns-2019-08
- https://www.tenable.com/security/tns-2019-08
- https://www.tenable.com/security/tns-2020-02
- https://www.tenable.com/security/tns-2020-02
Modified: 2024-11-21
CVE-2020-11022
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
- openSUSE-SU-2020:1060
- openSUSE-SU-2020:1106
- openSUSE-SU-2020:1888
- http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html
- https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
- https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77
- https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
- https://jquery.com/upgrade-guide/3.5/
- [flink-issues] 20211031 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20201129 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210429 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210209 [jira] [Comment Edited] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210209 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-dev] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [airflow-commits] 20200820 [GitHub] [airflow] breser opened a new issue #10429: jquery dependency needs to be updated to 3.5.0 or newer
- [flink-issues] 20210429 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210422 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210422 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- FEDORA-2020-0b32a59b54
- FEDORA-2020-36d2db5f51
- FEDORA-2020-fe94df8c34
- FEDORA-2020-fbb94073a1
- FEDORA-2020-11be4b36d4
- GLSA-202007-03
- https://security.netapp.com/advisory/ntap-20200511-0006/
- DSA-4693
- https://www.drupal.org/sa-core-2020-002
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2020-10
- https://www.tenable.com/security/tns-2020-11
- https://www.tenable.com/security/tns-2021-02
- https://www.tenable.com/security/tns-2021-10
- openSUSE-SU-2020:1060
- https://www.tenable.com/security/tns-2021-10
- https://www.tenable.com/security/tns-2021-02
- https://www.tenable.com/security/tns-2020-11
- https://www.tenable.com/security/tns-2020-10
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.drupal.org/sa-core-2020-002
- DSA-4693
- https://security.netapp.com/advisory/ntap-20200511-0006/
- GLSA-202007-03
- FEDORA-2020-11be4b36d4
- FEDORA-2020-fbb94073a1
- FEDORA-2020-fe94df8c34
- FEDORA-2020-36d2db5f51
- FEDORA-2020-0b32a59b54
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update
- [flink-issues] 20210422 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210422 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210429 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [airflow-commits] 20200820 [GitHub] [airflow] breser opened a new issue #10429: jquery dependency needs to be updated to 3.5.0 or newer
- [flink-dev] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210209 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210209 [jira] [Comment Edited] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210429 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20201129 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20211031 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- https://jquery.com/upgrade-guide/3.5/
- https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2
- https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77
- https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/
- http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html
- openSUSE-SU-2020:1888
- openSUSE-SU-2020:1106
Modified: 2025-04-04
CVE-2020-11023
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing
- openSUSE-SU-2020:1060
- openSUSE-SU-2020:1060
- openSUSE-SU-2020:1106
- openSUSE-SU-2020:1106
- openSUSE-SU-2020:1888
- openSUSE-SU-2020:1888
- http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
- http://packetstormsecurity.com/files/162160/jQuery-1.0.3-Cross-Site-Scripting.html
- https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
- https://blog.jquery.com/2020/04/10/jquery-3-5-0-released
- https://github.com/github/advisory-database/blob/99afa6fdeaf5d1d23e1021ff915a5e5dbc82c1f1/advisories/github-reviewed/2020/04/GHSA-jpcq-cgw6-v4j6/GHSA-jpcq-cgw6-v4j6.json#L20-L37
- https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
- https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6
- https://jquery.com/upgrade-guide/3.5/
- https://jquery.com/upgrade-guide/3.5/
- [flink-issues] 20211031 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20211031 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [hive-issues] 20200915 [jira] [Updated] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200915 [jira] [Updated] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [felix-dev] 20201208 [GitHub] [felix-dev] abhishekgarg18 opened a new pull request #64: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [felix-dev] 20201208 [GitHub] [felix-dev] abhishekgarg18 opened a new pull request #64: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [hive-issues] 20200813 [jira] [Assigned] (HIVE-24039) update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200813 [jira] [Assigned] (HIVE-24039) update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200915 [GitHub] [hive] kgyrtkirk merged pull request #1403: HIVE-24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200915 [GitHub] [hive] kgyrtkirk merged pull request #1403: HIVE-24039 : Update jquery version to mitigate CVE-2020-11023
- [felix-dev] 20201208 [jira] [Created] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [felix-dev] 20201208 [jira] [Created] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [felix-dev] 20201208 [GitHub] [felix-dev] cziegeler merged pull request #64: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [felix-dev] 20201208 [GitHub] [felix-dev] cziegeler merged pull request #64: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [flink-issues] 20201129 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20201129 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [hive-issues] 20200904 [jira] [Assigned] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200904 [jira] [Assigned] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [felix-dev] 20201208 [jira] [Updated] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [felix-dev] 20201208 [jira] [Updated] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [flink-issues] 20210429 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210429 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [felix-dev] 20201208 [jira] [Updated] (FELIX-6366) 1.0.3 < jQuery <3.5.0 is vulnerable to CVE-2020-11023
- [felix-dev] 20201208 [jira] [Updated] (FELIX-6366) 1.0.3 < jQuery <3.5.0 is vulnerable to CVE-2020-11023
- [flink-issues] 20210209 [jira] [Comment Edited] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210209 [jira] [Comment Edited] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [hive-issues] 20200915 [jira] [Work logged] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200915 [jira] [Work logged] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200902 [jira] [Assigned] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200902 [jira] [Assigned] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [flink-issues] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210209 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210209 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [felix-commits] 20201208 [felix-dev] branch master updated: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023 (#64)
- [felix-commits] 20201208 [felix-dev] branch master updated: FELIX-6366 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023 (#64)
- [hive-issues] 20200813 [jira] [Updated] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200813 [jira] [Updated] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [felix-dev] 20201208 [jira] [Commented] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [felix-dev] 20201208 [jira] [Commented] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [hive-gitbox] 20200912 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200912 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200911 [GitHub] [hive] rajkrrsingh closed pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200911 [GitHub] [hive] rajkrrsingh closed pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200813 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200813 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200915 [jira] [Resolved] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200915 [jira] [Resolved] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-commits] 20200915 [hive] branch master updated: HIVE-24039 : Update jquery version to mitigate CVE-2020-11023 (#1403)
- [hive-commits] 20200915 [hive] branch master updated: HIVE-24039 : Update jquery version to mitigate CVE-2020-11023 (#1403)
- [hive-issues] 20200902 [jira] [Work started] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200902 [jira] [Work started] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200911 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200911 [GitHub] [hive] rajkrrsingh opened a new pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200902 [jira] [Comment Edited] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200902 [jira] [Comment Edited] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [flink-dev] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-dev] 20201105 [jira] [Created] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [hive-issues] 20200902 [jira] [Commented] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [hive-issues] 20200902 [jira] [Commented] (HIVE-24039) Update jquery version to mitigate CVE-2020-11023
- [nifi-commits] 20200930 svn commit: r1882168 - /nifi/site/trunk/security.html
- [nifi-commits] 20200930 svn commit: r1882168 - /nifi/site/trunk/security.html
- [flink-issues] 20210429 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210429 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210422 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210422 [jira] [Commented] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210422 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [flink-issues] 20210422 [jira] [Updated] (FLINK-20014) Resolve CVE-2020-11022 and CVE-2020-11023 in scala-compiler
- [felix-dev] 20201208 [jira] [Assigned] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [felix-dev] 20201208 [jira] [Assigned] (FELIX-6366) 1.0.3 < jQuery <3.4.0 is vulnerable to CVE-2020-11023
- [hive-gitbox] 20200912 [GitHub] [hive] rajkrrsingh closed pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-gitbox] 20200912 [GitHub] [hive] rajkrrsingh closed pull request #1403: Hive 24039 : Update jquery version to mitigate CVE-2020-11023
- [hive-dev] 20200813 [jira] [Created] (HIVE-24039) update jquery version to mitigate CVE-2020-11023
- [hive-dev] 20200813 [jira] [Created] (HIVE-24039) update jquery version to mitigate CVE-2020-11023
- [debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update
- [debian-lts-announce] 20210326 [SECURITY] [DLA 2608-1] jquery security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- FEDORA-2020-0b32a59b54
- FEDORA-2020-0b32a59b54
- FEDORA-2020-36d2db5f51
- FEDORA-2020-36d2db5f51
- FEDORA-2020-fe94df8c34
- FEDORA-2020-fe94df8c34
- FEDORA-2020-fbb94073a1
- FEDORA-2020-fbb94073a1
- GLSA-202007-03
- GLSA-202007-03
- https://security.netapp.com/advisory/ntap-20200511-0006/
- https://security.netapp.com/advisory/ntap-20200511-0006/
- DSA-4693
- DSA-4693
- https://www.drupal.org/sa-core-2020-002
- https://www.drupal.org/sa-core-2020-002
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-02
- https://www.tenable.com/security/tns-2021-02
- https://www.tenable.com/security/tns-2021-10
- https://www.tenable.com/security/tns-2021-10
Package LibreOffice updated to version 7.0.1.2-alt1.0.p9 for branch p9 in task 259199.
Closed vulnerabilities
BDU:2019-03246
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2020-02358
Уязвимость пакета офисных программ LibreOffice, связанная с ошибками при шифровании информации, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2020-03672
Уязвимость компонента «скрытый режим» офисного пакета LibreOffice, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-03673
Уязвимость офисного пакета LibreOffice, связанная с некоректной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2020-03850
Уязвимость механизма безопасности выполнения макросов пакета офисных программ LibreOffice, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2019-9853
LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution This issue affects: LibreOffice 6.2 series versions prior to 6.2.7; LibreOffice 6.3 series versions prior to 6.3.1.
- openSUSE-SU-2019:2709
- http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html
- 20200220 Open-Xchange Security Advisory 2020-02-19
- [openoffice-commits] 20191124 svn commit: r1053271 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html
- [openoffice-commits] 20191124 svn commit: r1053270 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html
- [openoffice-commits] 20191124 svn commit: r1870336 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html
- [openoffice-commits] 20191016 svn commit: r1051583 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191016 svn commit: r1868517 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191124 svn commit: r1870324 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html
- [openoffice-commits] 20191124 svn commit: r1053267 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191124 svn commit: r1053264 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191124 svn commit: r1870322 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191124 svn commit: r1870337 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-4b0cc75996
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/
- openSUSE-SU-2019:2709
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/
- FEDORA-2019-4b0cc75996
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- [openoffice-commits] 20191124 svn commit: r1870337 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html
- [openoffice-commits] 20191124 svn commit: r1870322 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191124 svn commit: r1053264 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191124 svn commit: r1053267 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html
- [openoffice-commits] 20191124 svn commit: r1870324 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191016 svn commit: r1868517 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191016 svn commit: r1051583 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html
- [openoffice-commits] 20191124 svn commit: r1870336 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html
- [openoffice-commits] 20191124 svn commit: r1053270 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html
- [openoffice-commits] 20191124 svn commit: r1053271 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html
- 20200220 Open-Xchange Security Advisory 2020-02-19
- http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html
Modified: 2024-11-21
CVE-2019-9854
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
- MISC
- openSUSE-SU-2019:2183
- openSUSE-SU-2019:2361
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-9627e1402e
- 20190910 [SECURITY] [DSA 4519-1] libreoffice security update
- USN-4138-1
- DSA-4519
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/
- openSUSE-SU-2019:2183
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/
- DSA-4519
- USN-4138-1
- 20190910 [SECURITY] [DSA 4519-1] libreoffice security update
- FEDORA-2019-9627e1402e
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- openSUSE-SU-2019:2361
Modified: 2024-11-21
CVE-2020-12801
If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.
- openSUSE-SU-2020:0786
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12801
- openSUSE-SU-2020:0786
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12801
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
Modified: 2024-11-21
CVE-2020-12802
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where remote graphic links loaded from docx documents were omitted from this protection prior to version 6.4.4. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
- openSUSE-SU-2020:1222
- openSUSE-SU-2020:1261
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- FEDORA-2020-8922773bc4
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12802
- openSUSE-SU-2020:1222
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12802
- FEDORA-2020-8922773bc4
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- openSUSE-SU-2020:1261
Modified: 2024-11-21
CVE-2020-12803
ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
- openSUSE-SU-2020:1222
- openSUSE-SU-2020:1261
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- FEDORA-2020-8922773bc4
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12803
- openSUSE-SU-2020:1222
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12803
- FEDORA-2020-8922773bc4
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- openSUSE-SU-2020:1261
Package make-initrd updated to version 2.11.0-alt3 for branch p9 in task 259782.
Closed bugs
При переезде на новый make-initrd потеряли multipathd
Closed vulnerabilities
BDU:2017-00174
Уязвимость операционной системы OpenSUSE Leap, позволяющая нарушителю обойти проверку сертификата
Modified: 2024-11-21
CVE-2016-9422
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. The feed_table_tag function in w3m doesn't properly validate the value of table span, which allows remote attackers to cause a denial of service (stack and/or heap buffer overflow) and possibly execute arbitrary code via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/8
- https://github.com/tats/w3m/issues/8
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9423
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/9
- https://github.com/tats/w3m/issues/9
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9424
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/12
- https://github.com/tats/w3m/issues/12
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9425
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/21
- https://github.com/tats/w3m/issues/21
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9426
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Integer overflow vulnerability in the renderTable function in w3m allows remote attackers to cause a denial of service (OOM) and possibly execute arbitrary code due to bdwgc's bug (CVE-2016-9427) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/25
- https://github.com/tats/w3m/issues/25
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9428
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/26
- https://github.com/tats/w3m/issues/26
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9429
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Buffer overflow in the formUpdateBuffer function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/29
- https://github.com/tats/w3m/issues/29
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9430
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/7
- https://github.com/tats/w3m/issues/7
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9431
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/10
- https://github.com/tats/w3m/issues/10
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9432
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (memory corruption, segmentation fault, and crash) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/13
- https://github.com/tats/w3m/issues/13
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9433
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (out-of-bounds array access) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/14
- https://github.com/tats/w3m/issues/14
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9434
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/15
- https://github.com/tats/w3m/issues/15
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9435
The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to
- openSUSE-SU-2016:3121
- openSUSE-SU-2016:3121
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd
- https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd
- https://github.com/tats/w3m/issues/16
- https://github.com/tats/w3m/issues/16
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9436
parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a tag.
- openSUSE-SU-2016:3121
- openSUSE-SU-2016:3121
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd
- https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd
- https://github.com/tats/w3m/issues/16
- https://github.com/tats/w3m/issues/16
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9437
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/17
- https://github.com/tats/w3m/issues/17
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9438
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/18
- https://github.com/tats/w3m/issues/18
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9439
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/20
- https://github.com/tats/w3m/issues/20
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9440
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/22
- https://github.com/tats/w3m/issues/22
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9441
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/24
- https://github.com/tats/w3m/issues/24
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9442
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause memory corruption in certain conditions via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/commit/d43527cfa0dbb3ccefec4a6f7b32c1434739aa29
- https://github.com/tats/w3m/commit/d43527cfa0dbb3ccefec4a6f7b32c1434739aa29
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9443
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161118 Re: CVE request: w3m - multiple vulnerabilities
- 94407
- 94407
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/28
- https://github.com/tats/w3m/issues/28
- GLSA-201701-08
- GLSA-201701-08
Modified: 2024-11-21
CVE-2016-9622
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/32
- https://github.com/tats/w3m/issues/32
Modified: 2024-11-21
CVE-2016-9623
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/33
- https://github.com/tats/w3m/issues/33
Modified: 2024-11-21
CVE-2016-9624
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/35
- https://github.com/tats/w3m/issues/35
Modified: 2024-11-21
CVE-2016-9625
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/36
- https://github.com/tats/w3m/issues/36
Modified: 2024-11-21
CVE-2016-9626
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/37
- https://github.com/tats/w3m/issues/37
Modified: 2024-11-21
CVE-2016-9627
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/38
- https://github.com/tats/w3m/issues/38
Modified: 2024-11-21
CVE-2016-9628
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/39
- https://github.com/tats/w3m/issues/39
Modified: 2024-11-21
CVE-2016-9629
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/40
- https://github.com/tats/w3m/issues/40
Modified: 2024-11-21
CVE-2016-9630
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/41
- https://github.com/tats/w3m/issues/41
Modified: 2024-11-21
CVE-2016-9631
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/42
- https://github.com/tats/w3m/issues/42
Modified: 2024-11-21
CVE-2016-9632
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/43
- https://github.com/tats/w3m/issues/43
Modified: 2024-11-21
CVE-2016-9633
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (infinite loop and resource consumption) via a crafted HTML page.
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- [oss-security] 20161123 Re: CVE request: w3m - multiple vulnerabilities
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/blob/master/ChangeLog
- https://github.com/tats/w3m/issues/23
- https://github.com/tats/w3m/issues/23
Modified: 2024-11-21
CVE-2018-6196
w3m through 0.5.3 is prone to an infinite recursion flaw in HTMLlineproc0 because the feed_table_block_tag function in table.c does not prevent a negative indent value.
- openSUSE-SU-2019:1142
- openSUSE-SU-2019:1142
- https://github.com/tats/w3m/commit/8354763b90490d4105695df52674d0fcef823e92
- https://github.com/tats/w3m/commit/8354763b90490d4105695df52674d0fcef823e92
- https://github.com/tats/w3m/issues/88
- https://github.com/tats/w3m/issues/88
- [debian-lts-announce] 20200430 [SECURITY] [DLA 2195-1] w3m security update
- [debian-lts-announce] 20200430 [SECURITY] [DLA 2195-1] w3m security update
- USN-3555-1
- USN-3555-1
- USN-3555-2
- USN-3555-2
Modified: 2024-11-21
CVE-2018-6197
w3m through 0.5.3 is prone to a NULL pointer dereference flaw in formUpdateBuffer in form.c.
- openSUSE-SU-2019:1142
- openSUSE-SU-2019:1142
- 102846
- 102846
- https://github.com/tats/w3m/commit/7fdc83b0364005a0b5ed869230dd81752ba022e8
- https://github.com/tats/w3m/commit/7fdc83b0364005a0b5ed869230dd81752ba022e8
- https://github.com/tats/w3m/issues/89
- https://github.com/tats/w3m/issues/89
- [debian-lts-announce] 20200430 [SECURITY] [DLA 2195-1] w3m security update
- [debian-lts-announce] 20200430 [SECURITY] [DLA 2195-1] w3m security update
- USN-3555-1
- USN-3555-1
- USN-3555-2
- USN-3555-2
Modified: 2024-11-21
CVE-2018-6198
w3m through 0.5.3 does not properly handle temporary files when the ~/.w3m directory is unwritable, which allows a local attacker to craft a symlink attack to overwrite arbitrary files.
- openSUSE-SU-2019:1142
- openSUSE-SU-2019:1142
- 102855
- 102855
- https://bugs.debian.org/888097
- https://bugs.debian.org/888097
- https://github.com/tats/w3m/commit/18dcbadf2771cdb0c18509b14e4e73505b242753
- https://github.com/tats/w3m/commit/18dcbadf2771cdb0c18509b14e4e73505b242753
- https://salsa.debian.org/debian/w3m/commit/18dcbadf2771cdb0c18509b14e4e73505b242753
- https://salsa.debian.org/debian/w3m/commit/18dcbadf2771cdb0c18509b14e4e73505b242753
- USN-3555-1
- USN-3555-1
- USN-3555-2
- USN-3555-2
Modified: 2025-02-08
CVE-2023-38252
An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.
- https://access.redhat.com/security/cve/CVE-2023-38252
- https://access.redhat.com/security/cve/CVE-2023-38252
- RHBZ#2222775
- RHBZ#2222775
- https://github.com/tats/w3m/issues/270
- https://github.com/tats/w3m/issues/270
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
Modified: 2024-11-21
CVE-2023-38253
An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file.
- https://access.redhat.com/security/cve/CVE-2023-38253
- https://access.redhat.com/security/cve/CVE-2023-38253
- RHBZ#2222779
- RHBZ#2222779
- https://github.com/tats/w3m/issues/271
- https://github.com/tats/w3m/issues/271
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
Modified: 2024-11-21
CVE-2023-4255
An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition.
- RHBZ#2255207
- RHBZ#2255207
- https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3
- https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3
- https://github.com/tats/w3m/issues/268
- https://github.com/tats/w3m/issues/268
- https://github.com/tats/w3m/pull/273
- https://github.com/tats/w3m/pull/273
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/