You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa w3m

Sigurnosni nedostaci programskog paketa w3m

==========================================================================
Ubuntu Security Notice USN-3555-1
February 01, 2018

w3m vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in w3m.

Software Description:
– w3m: WWW browsable pager with excellent tables/frames support

Details:

It was discovered that w3m incorrectly handled certain inputs.
An attacker could possibly use this to cause a denial of service.
(CVE-2018-6196, CVE-2018-6197)

It was discovered that w3m incorrectly handled temporary files.
An attacker could possibly use this to overwrite arbitrary files.
(CVE-2018-6198)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
  w3m                             0.5.3-34ubuntu0.1

Ubuntu 16.04 LTS:
  w3m                             0.5.3-26ubuntu0.2

Ubuntu 14.04 LTS:
  w3m                             0.5.3-15ubuntu0.2

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3555-1
  CVE-2018-6196, CVE-2018-6197, CVE-2018-6198

Package Information:
  https://launchpad.net/ubuntu/+source/w3m/0.5.3-34ubuntu0.1
  https://launchpad.net/ubuntu/+source/w3m/0.5.3-26ubuntu0.2
  https://launchpad.net/ubuntu/+source/w3m/0.5.3-15ubuntu0.2
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=FQm7
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3555-2
February 01, 2018

w3m vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in w3m.

Software Description:
– w3m: WWW browsable pager with excellent tables/frames support

Details:

USN-3555-2 fixed vulnerabilities in w3m. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:

 It was discovered that w3m incorrectly handled certain inputs.
 An attacker could possibly use this to cause a denial of service.
 (CVE-2018-6196, CVE-2018-6197)

 It was discovered that w3m incorrectly handled temporary files.
 An attacker could possibly use this to overwrite arbitrary files.
 (CVE-2018-6198)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  w3m                             0.5.3-5ubuntu1.3

In general, a standard system update will make all the necessary
changes.

References:
  https://www.ubuntu.com/usn/usn-3555-2
  https://www.ubuntu.com/usn/usn-3555-1
  CVE-2018-6196, CVE-2018-6197, CVE-2018-6198
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=lAB7
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa dovecot

Otkriveni su sigurnosni nedostaci u programskom paketu dovecot za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanja...

Close