Ubuntu 5796-2: w3m vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5796-2
January 10, 2023

w3m vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

w3m could be made to crash or run programs as your login if it opened a
malicious website.

Software Description:
- w3m: WWW browsable pager with excellent tables/frames support

Details:

USN-5796-1 fixed a vulnerability in w3m. This update provides
the corresponding update for Ubuntu 14.04 ESM.

Original advisory details:

 It was discovered that w3m incorrectly handled certain HTML files. A remote
 attacker could use this issue to cause w3m to crash, resulting in a denial
 of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
  w3m                             0.5.3-15ubuntu0.2+esm1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5796-2
  https://ubuntu.com/security/notices/USN-5796-1
  CVE-2022-38223

Ubuntu 5796-2: w3m vulnerability

January 10, 2023
w3m could be made to crash or run programs as your login if it opened a malicious website.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 ESM Summary: w3m could be made to crash or run programs as your login if it opened a malicious website. Software Description: - w3m: WWW browsable pager with excellent tables/frames support Details: USN-5796-1 fixed a vulnerability in w3m. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: It was discovered that w3m incorrectly handled certain HTML files. A remote attacker could use this issue to cause w3m to crash, resulting in a denial of service, or possibly execute arbitrary code.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 ESM: w3m 0.5.3-15ubuntu0.2+esm1 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5796-2

https://ubuntu.com/security/notices/USN-5796-1

CVE-2022-38223

Severity
Ubuntu Security Notice USN-5796-2

Package Information

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.