USN-5796-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-5796-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5796-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5796-1
Related
Published
2023-01-09T13:17:38.741389Z
Modified
2023-01-09T13:17:38.741389Z
Summary
w3m vulnerability
Details

It was discovered that w3m incorrectly handled certain HTML files. A remote attacker could use this issue to cause w3m to crash, resulting in a denial of service, or possibly execute arbitrary code.

References

Affected packages

Ubuntu:22.04:LTS / w3m

Package

Name
w3m

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.3+git20210102-6ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "w3m-img": "0.5.3+git20210102-6ubuntu0.1",
            "w3m": "0.5.3+git20210102-6ubuntu0.1"
        }
    ]
}

Ubuntu:18.04:LTS / w3m

Package

Name
w3m

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.3-36ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "w3m-img": "0.5.3-36ubuntu0.1",
            "w3m": "0.5.3-36ubuntu0.1"
        }
    ]
}

Ubuntu:20.04:LTS / w3m

Package

Name
w3m

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.3-37ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "w3m-img": "0.5.3-37ubuntu0.1",
            "w3m": "0.5.3-37ubuntu0.1"
        }
    ]
}