First published: Mon Jan 15 2024(Updated: )
It was discovered that w3m incorrectly handled certain HTML files. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/w3m | <0.5.3+git20230121-2ubuntu0.23.10.1 | 0.5.3+git20230121-2ubuntu0.23.10.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/w3m | <0.5.3+git20230121-2ubuntu0.23.04.1 | 0.5.3+git20230121-2ubuntu0.23.04.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/w3m | <0.5.3+git20210102-6ubuntu0.2 | 0.5.3+git20210102-6ubuntu0.2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/w3m | <0.5.3-37ubuntu0.2 | 0.5.3-37ubuntu0.2 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/w3m | <0.5.3-36ubuntu0.1+esm1 | 0.5.3-36ubuntu0.1+esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/w3m | <0.5.3-15ubuntu0.2+esm2 | 0.5.3-15ubuntu0.2+esm2 |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6580-1 is categorized as a potentially high-severity vulnerability that may allow for crashes or arbitrary code execution in affected versions of w3m.
To fix USN-6580-1, you should upgrade w3m to the latest patched version specified in the advisory for your Ubuntu release.
USN-6580-1 affects various supported versions of Ubuntu using the w3m package, including Ubuntu 23.10, 23.04, 22.04, 20.04, 18.04, and 14.04.
USN-6580-1 represents a vulnerability in w3m that could be exploited to cause software crashes or to execute arbitrary code by manipulating certain HTML files.
As of the latest information, there have been no reported active exploits for the vulnerability described in USN-6580-1.