Security update for w3m
Announcement ID: | SUSE-SU-2016:3046-1 |
---|---|
Rating: | moderate |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 28 vulnerabilities can now be installed.
Description:
This update for w3m fixes the following issues:
- update to debian git version (bsc#1011293) addressed security issues: CVE-2016-9621: w3m: global-buffer-overflow write (bsc#1012020) CVE-2016-9622: w3m: null deref (bsc#1012021) CVE-2016-9623: w3m: null deref (bsc#1012022) CVE-2016-9624: w3m: near-null deref (bsc#1012023) CVE-2016-9625: w3m: stack overflow (bsc#1012024) CVE-2016-9626: w3m: stack overflow (bsc#1012025) CVE-2016-9627: w3m: heap overflow read + deref (bsc#1012026) CVE-2016-9628: w3m: null deref (bsc#1012027) CVE-2016-9629: w3m: null deref (bsc#1012028) CVE-2016-9630: w3m: global-buffer-overflow read (bsc#1012029) CVE-2016-9631: w3m: null deref (bsc#1012030) CVE-2016-9632: w3m: global-buffer-overflow read (bsc#1012031) CVE-2016-9633: w3m: OOM (bsc#1012032) CVE-2016-9434: w3m: null deref (bsc#1011283) CVE-2016-9435: w3m: use uninit value (bsc#1011284) CVE-2016-9436: w3m: use uninit value (bsc#1011285) CVE-2016-9437: w3m: write to rodata (bsc#1011286) CVE-2016-9438: w3m: null deref (bsc#1011287) CVE-2016-9439: w3m: stack overflow (bsc#1011288) CVE-2016-9440: w3m: near-null deref (bsc#1011289) CVE-2016-9441: w3m: near-null deref (bsc#1011290) CVE-2016-9442: w3m: potential heap buffer corruption (bsc#1011291) CVE-2016-9443: w3m: null deref (bsc#1011292)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-w3m-12875=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-w3m-12875=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- w3m-0.5.3.git20161120-4.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- w3m-0.5.3.git20161120-4.1
References:
- https://www.suse.com/security/cve/CVE-2010-2074.html
- https://www.suse.com/security/cve/CVE-2016-9422.html
- https://www.suse.com/security/cve/CVE-2016-9423.html
- https://www.suse.com/security/cve/CVE-2016-9424.html
- https://www.suse.com/security/cve/CVE-2016-9425.html
- https://www.suse.com/security/cve/CVE-2016-9434.html
- https://www.suse.com/security/cve/CVE-2016-9435.html
- https://www.suse.com/security/cve/CVE-2016-9436.html
- https://www.suse.com/security/cve/CVE-2016-9437.html
- https://www.suse.com/security/cve/CVE-2016-9438.html
- https://www.suse.com/security/cve/CVE-2016-9439.html
- https://www.suse.com/security/cve/CVE-2016-9440.html
- https://www.suse.com/security/cve/CVE-2016-9441.html
- https://www.suse.com/security/cve/CVE-2016-9442.html
- https://www.suse.com/security/cve/CVE-2016-9443.html
- https://www.suse.com/security/cve/CVE-2016-9621.html
- https://www.suse.com/security/cve/CVE-2016-9622.html
- https://www.suse.com/security/cve/CVE-2016-9623.html
- https://www.suse.com/security/cve/CVE-2016-9624.html
- https://www.suse.com/security/cve/CVE-2016-9625.html
- https://www.suse.com/security/cve/CVE-2016-9626.html
- https://www.suse.com/security/cve/CVE-2016-9627.html
- https://www.suse.com/security/cve/CVE-2016-9628.html
- https://www.suse.com/security/cve/CVE-2016-9629.html
- https://www.suse.com/security/cve/CVE-2016-9630.html
- https://www.suse.com/security/cve/CVE-2016-9631.html
- https://www.suse.com/security/cve/CVE-2016-9632.html
- https://www.suse.com/security/cve/CVE-2016-9633.html
- https://bugzilla.suse.com/show_bug.cgi?id=1011269
- https://bugzilla.suse.com/show_bug.cgi?id=1011270
- https://bugzilla.suse.com/show_bug.cgi?id=1011271
- https://bugzilla.suse.com/show_bug.cgi?id=1011272
- https://bugzilla.suse.com/show_bug.cgi?id=1011283
- https://bugzilla.suse.com/show_bug.cgi?id=1011284
- https://bugzilla.suse.com/show_bug.cgi?id=1011285
- https://bugzilla.suse.com/show_bug.cgi?id=1011286
- https://bugzilla.suse.com/show_bug.cgi?id=1011287
- https://bugzilla.suse.com/show_bug.cgi?id=1011288
- https://bugzilla.suse.com/show_bug.cgi?id=1011289
- https://bugzilla.suse.com/show_bug.cgi?id=1011290
- https://bugzilla.suse.com/show_bug.cgi?id=1011291
- https://bugzilla.suse.com/show_bug.cgi?id=1011292
- https://bugzilla.suse.com/show_bug.cgi?id=1011293
- https://bugzilla.suse.com/show_bug.cgi?id=1012020
- https://bugzilla.suse.com/show_bug.cgi?id=1012021
- https://bugzilla.suse.com/show_bug.cgi?id=1012022
- https://bugzilla.suse.com/show_bug.cgi?id=1012023
- https://bugzilla.suse.com/show_bug.cgi?id=1012024
- https://bugzilla.suse.com/show_bug.cgi?id=1012025
- https://bugzilla.suse.com/show_bug.cgi?id=1012026
- https://bugzilla.suse.com/show_bug.cgi?id=1012027
- https://bugzilla.suse.com/show_bug.cgi?id=1012028
- https://bugzilla.suse.com/show_bug.cgi?id=1012029
- https://bugzilla.suse.com/show_bug.cgi?id=1012030
- https://bugzilla.suse.com/show_bug.cgi?id=1012031
- https://bugzilla.suse.com/show_bug.cgi?id=1012032