Fedora has issued an advisory on March 27: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/ Mageia 9 is also affected.
CVE: (none) => CVE-2023-38252, CVE-2023-38253, CVE-2023-4255Status comment: (none) => Patch available from FedoraWhiteboard: (none) => MGA9TOOSource RPM: (none) => w3m-0.5.3-13.git20220429.1.mga9.src.rpm
Suggested advisory: ======================== The updated package fixes security vulnerabilities: An out-of-bounds read flaw was found in w3m, in the Strnew_size function in Str.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. (CVE-2023-38252) An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. (CVE-2023-38253) An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition. (CVE-2023-4255) References: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/ ======================== Updated package in core/updates_testing: ======================== w3m-0.5.3-13.git20230121.1.mga9 from SRPM: w3m-0.5.3-13.git20230121.1.mga9.src.rpm
Assignee: bugsquad => qa-bugsWhiteboard: MGA9TOO => (none)Status comment: Patch available from Fedora => (none)Status: NEW => ASSIGNEDVersion: Cauldron => 9
Keywords: (none) => advisory
CC: (none) => andrewsfarm
urpmi w3m https://mirror.math.princeton.edu/pub/mageia/distrib/9/x86_64/media/core/release/w3m-0.5.3-13.git20220429.1.mga9.x86_64.rpm instalando w3m-0.5.3-13.git20220429.1.mga9.x86_64.rpm desde /var/cache/urpmi/rpms Preparando... ################################################################################################## 1/1: w3m ################################################################################################## LC_ALL=C urpmi --auto --auto-update medium "QA Testing (32-bit)" is up-to-date medium "QA Testing (64-bit)" is up-to-date medium "Core Release (distrib1)" is up-to-date medium "Core Updates (distrib3)" is up-to-date medium "Nonfree Release (distrib11)" is up-to-date medium "Nonfree Updates (distrib13)" is up-to-date medium "Tainted Release (distrib21)" is up-to-date medium "Tainted Updates (distrib23)" is up-to-date medium "Core 32bit Release (distrib31)" is up-to-date medium "Core 32bit Updates (distrib32)" is up-to-date medium "Nonfree 32bit Release (distrib36)" is up-to-date medium "Tainted 32bit Release (distrib41)" is up-to-date medium "Tainted 32bit Updates (distrib42)" is up-to-date installing w3m-0.5.3-13.git20230121.1.mga9.x86_64.rpm from //home/katnatek/qa-testing/x86_64 Preparing... ################################################################################################## 1/1: w3m ################################################################################################## 1/1: removing w3m-0.5.3-13.git20220429.1.mga9.x86_64 ################################################################################################## open this bug with w3m w3m https://bugs.mageia.org/show_bug.cgi?id=33027 Load a text mode version of the page Give OK based in previous criteria
Whiteboard: (none) => MGA9-64-OK
Validating.
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
The SRPM in the advisory doesn't match the one in the bug.
CC: (none) => dan
(In reply to Dan Fandrich from comment #4) > The SRPM in the advisory doesn't match the one in the bug. Fixed and thank you
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2024-0105.html
Resolution: (none) => FIXEDStatus: ASSIGNED => RESOLVED