There is an out-of-bounds write in checkType located in etc.c in w3m 0.5.3. It can be triggered by sending a crafted HTML file to the w3m binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "w3m", "binary_version": "0.5.3-15ubuntu0.2+esm1" }, { "binary_name": "w3m-img", "binary_version": "0.5.3-15ubuntu0.2+esm1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-38223.json"
{ "binaries": [ { "binary_name": "w3m", "binary_version": "0.5.3-26ubuntu0.2" }, { "binary_name": "w3m-img", "binary_version": "0.5.3-26ubuntu0.2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "w3m", "binary_version": "0.5.3-36ubuntu0.1" }, { "binary_name": "w3m-img", "binary_version": "0.5.3-36ubuntu0.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "w3m", "binary_version": "0.5.3-37ubuntu0.1" }, { "binary_name": "w3m-img", "binary_version": "0.5.3-37ubuntu0.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "w3m", "binary_version": "0.5.3+git20210102-6ubuntu0.1" }, { "binary_name": "w3m-img", "binary_version": "0.5.3+git20210102-6ubuntu0.1" } ] }