First published: Tue Dec 19 2023(Updated: )
w3m has an out-of-bounds write in function checkType() in etc.c. It allows a local attacker to cause Denial of Service or possibly have unspecified other impact via a crafted HTML file. NOTE: It was introduced in the fix of <a href="https://access.redhat.com/security/cve/CVE-2022-38223">CVE-2022-38223</a>. Affects: w3m 0.5.3+git20230129, 0.5.3+git20230121-1, 0.5.3+git20230121-2 Not Affected version: < 0.5.3+git20220429-1 <a href="https://github.com/tats/w3m/issues/268">https://github.com/tats/w3m/issues/268</a> <a href="https://github.com/tats/w3m/pull/273">https://github.com/tats/w3m/pull/273</a>
Affected Software | Affected Version | How to fix |
---|---|---|
w3m | >=0.5.3+git20230129>=0.5.3+git20230121-1>=0.5.3+git20230121-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.