Discover Government News


MGASA-2024-0105 - Updated w3m packages fix security vulnerabilities

Publication date: 01 Apr 2024
URL: https://advisories.mageia.org/MGASA-2024-0105.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2023-38252,
     CVE-2023-38253,
     CVE-2023-4255

An out-of-bounds read flaw was found in w3m, in the Strnew_size function
in Str.c. This issue may allow an attacker to cause a denial of service
through a crafted HTML file. (CVE-2023-38252)
An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str
function in indep.c. This issue may allow an attacker to cause a denial
of service through a crafted HTML file. (CVE-2023-38253)
An out-of-bounds write issue has been discovered in the backspace
handling of the checkType() function in etc.c within the W3M
application. This vulnerability is triggered by supplying a specially
crafted HTML file to the w3m binary. Exploitation of this flaw could
lead to application crashes, resulting in a denial of service condition.
(CVE-2023-4255)

References:
- https://bugs.mageia.org/show_bug.cgi?id=33027
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38252
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4255

SRPMS:
- 9/core/w3m-0.5.3-13.git20230121.1.mga9

Mageia 2024-0105: w3m security update

An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c

Summary

An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. (CVE-2023-38252) An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. (CVE-2023-38253) An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition. (CVE-2023-4255)

References

- https://bugs.mageia.org/show_bug.cgi?id=33027

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38252

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38253

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4255

Resolution

MGASA-2024-0105 - Updated w3m packages fix security vulnerabilities

SRPMS

- 9/core/w3m-0.5.3-13.git20230121.1.mga9

Severity
Publication date: 01 Apr 2024
URL: https://advisories.mageia.org/MGASA-2024-0105.html
Type: security
CVE: CVE-2023-38252, CVE-2023-38253, CVE-2023-4255

Related News