opensuse-su-2024:10235-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
w3m-0.5.3.git20161120-1.1 on GA media
Notes
Title of the patch
w3m-0.5.3.git20161120-1.1 on GA media
Description of the patch
These are all security issues fixed in the w3m-0.5.3.git20161120-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10235
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "w3m-0.5.3.git20161120-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the w3m-0.5.3.git20161120-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10235", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10235-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2074 page", "url": "https://www.suse.com/security/cve/CVE-2010-2074/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-4929 page", "url": "https://www.suse.com/security/cve/CVE-2012-4929/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9434 page", "url": "https://www.suse.com/security/cve/CVE-2016-9434/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9435 page", "url": "https://www.suse.com/security/cve/CVE-2016-9435/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9436 page", "url": "https://www.suse.com/security/cve/CVE-2016-9436/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9437 page", "url": "https://www.suse.com/security/cve/CVE-2016-9437/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9438 page", "url": "https://www.suse.com/security/cve/CVE-2016-9438/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9439 page", "url": "https://www.suse.com/security/cve/CVE-2016-9439/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9440 page", "url": "https://www.suse.com/security/cve/CVE-2016-9440/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9441 page", "url": "https://www.suse.com/security/cve/CVE-2016-9441/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9442 page", "url": "https://www.suse.com/security/cve/CVE-2016-9442/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9443 page", "url": "https://www.suse.com/security/cve/CVE-2016-9443/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9621 page", "url": "https://www.suse.com/security/cve/CVE-2016-9621/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9622 page", "url": "https://www.suse.com/security/cve/CVE-2016-9622/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9623 page", "url": "https://www.suse.com/security/cve/CVE-2016-9623/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9624 page", "url": "https://www.suse.com/security/cve/CVE-2016-9624/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9625 page", "url": "https://www.suse.com/security/cve/CVE-2016-9625/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9626 page", "url": "https://www.suse.com/security/cve/CVE-2016-9626/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9627 page", "url": "https://www.suse.com/security/cve/CVE-2016-9627/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9628 page", "url": "https://www.suse.com/security/cve/CVE-2016-9628/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9629 page", "url": "https://www.suse.com/security/cve/CVE-2016-9629/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9630 page", "url": "https://www.suse.com/security/cve/CVE-2016-9630/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9631 page", "url": "https://www.suse.com/security/cve/CVE-2016-9631/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9632 page", "url": "https://www.suse.com/security/cve/CVE-2016-9632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9633 page", "url": "https://www.suse.com/security/cve/CVE-2016-9633/" } ], "title": "w3m-0.5.3.git20161120-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10235-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "w3m-0.5.3.git20161120-1.1.aarch64", "product": { "name": "w3m-0.5.3.git20161120-1.1.aarch64", "product_id": "w3m-0.5.3.git20161120-1.1.aarch64" } }, { "category": "product_version", "name": "w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "product": { "name": "w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "product_id": "w3m-inline-image-0.5.3.git20161120-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "w3m-0.5.3.git20161120-1.1.ppc64le", "product": { "name": "w3m-0.5.3.git20161120-1.1.ppc64le", "product_id": "w3m-0.5.3.git20161120-1.1.ppc64le" } }, { "category": "product_version", "name": "w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "product": { "name": "w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "product_id": "w3m-inline-image-0.5.3.git20161120-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "w3m-0.5.3.git20161120-1.1.s390x", "product": { "name": "w3m-0.5.3.git20161120-1.1.s390x", "product_id": "w3m-0.5.3.git20161120-1.1.s390x" } }, { "category": "product_version", "name": "w3m-inline-image-0.5.3.git20161120-1.1.s390x", "product": { "name": "w3m-inline-image-0.5.3.git20161120-1.1.s390x", "product_id": "w3m-inline-image-0.5.3.git20161120-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "w3m-0.5.3.git20161120-1.1.x86_64", "product": { "name": "w3m-0.5.3.git20161120-1.1.x86_64", "product_id": "w3m-0.5.3.git20161120-1.1.x86_64" } }, { "category": "product_version", "name": "w3m-inline-image-0.5.3.git20161120-1.1.x86_64", "product": { "name": "w3m-inline-image-0.5.3.git20161120-1.1.x86_64", "product_id": "w3m-inline-image-0.5.3.git20161120-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "w3m-0.5.3.git20161120-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64" }, "product_reference": "w3m-0.5.3.git20161120-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "w3m-0.5.3.git20161120-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le" }, "product_reference": "w3m-0.5.3.git20161120-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "w3m-0.5.3.git20161120-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x" }, "product_reference": "w3m-0.5.3.git20161120-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "w3m-0.5.3.git20161120-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64" }, "product_reference": "w3m-0.5.3.git20161120-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "w3m-inline-image-0.5.3.git20161120-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64" }, "product_reference": "w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "w3m-inline-image-0.5.3.git20161120-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le" }, "product_reference": "w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "w3m-inline-image-0.5.3.git20161120-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x" }, "product_reference": "w3m-inline-image-0.5.3.git20161120-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "w3m-inline-image-0.5.3.git20161120-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" }, "product_reference": "w3m-inline-image-0.5.3.git20161120-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-2074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2074" } ], "notes": [ { "category": "general", "text": "istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a \u0027\\0\u0027 character in a domain name in the (1) subject\u0027s Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2074", "url": "https://www.suse.com/security/cve/CVE-2010-2074" }, { "category": "external", "summary": "SUSE Bug 609451 for CVE-2010-2074", "url": "https://bugzilla.suse.com/609451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2074" }, { "cve": "CVE-2012-4929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-4929" } ], "notes": [ { "category": "general", "text": "The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a \"CRIME\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-4929", "url": "https://www.suse.com/security/cve/CVE-2012-4929" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2012-4929", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 779952 for CVE-2012-4929", "url": "https://bugzilla.suse.com/779952" }, { "category": "external", "summary": "SUSE Bug 793420 for CVE-2012-4929", "url": "https://bugzilla.suse.com/793420" }, { "category": "external", "summary": "SUSE Bug 803004 for CVE-2012-4929", "url": "https://bugzilla.suse.com/803004" }, { "category": "external", "summary": "SUSE Bug 847895 for CVE-2012-4929", "url": "https://bugzilla.suse.com/847895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2012-4929" }, { "cve": "CVE-2016-9434", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9434" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9434", "url": "https://www.suse.com/security/cve/CVE-2016-9434" }, { "category": "external", "summary": "SUSE Bug 1011283 for CVE-2016-9434", "url": "https://bugzilla.suse.com/1011283" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9434", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9434" }, { "cve": "CVE-2016-9435", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9435" } ], "notes": [ { "category": "general", "text": "The HTMLtagproc1 function in file.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to \u003cdd\u003e tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9435", "url": "https://www.suse.com/security/cve/CVE-2016-9435" }, { "category": "external", "summary": "SUSE Bug 1011284 for CVE-2016-9435", "url": "https://bugzilla.suse.com/1011284" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9435", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9435" }, { "cve": "CVE-2016-9436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9436" } ], "notes": [ { "category": "general", "text": "parsetagx.c in w3m before 0.5.3+git20161009 does not properly initialize values, which allows remote attackers to crash the application via a crafted html file, related to a \u003ci\u003e tag.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9436", "url": "https://www.suse.com/security/cve/CVE-2016-9436" }, { "category": "external", "summary": "SUSE Bug 1011285 for CVE-2016-9436", "url": "https://bugzilla.suse.com/1011285" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9436", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9436" }, { "cve": "CVE-2016-9437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9437" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) and possibly memory corruption via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9437", "url": "https://www.suse.com/security/cve/CVE-2016-9437" }, { "category": "external", "summary": "SUSE Bug 1011286 for CVE-2016-9437", "url": "https://bugzilla.suse.com/1011286" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9437", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9437" }, { "cve": "CVE-2016-9438", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9438" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9438", "url": "https://www.suse.com/security/cve/CVE-2016-9438" }, { "category": "external", "summary": "SUSE Bug 1011287 for CVE-2016-9438", "url": "https://bugzilla.suse.com/1011287" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9438", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9438" }, { "cve": "CVE-2016-9439", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9439" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9439", "url": "https://www.suse.com/security/cve/CVE-2016-9439" }, { "category": "external", "summary": "SUSE Bug 1011288 for CVE-2016-9439", "url": "https://bugzilla.suse.com/1011288" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9439", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9439" }, { "cve": "CVE-2016-9440", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9440" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9440", "url": "https://www.suse.com/security/cve/CVE-2016-9440" }, { "category": "external", "summary": "SUSE Bug 1011289 for CVE-2016-9440", "url": "https://bugzilla.suse.com/1011289" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9440", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9440" }, { "cve": "CVE-2016-9441", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9441" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9441", "url": "https://www.suse.com/security/cve/CVE-2016-9441" }, { "category": "external", "summary": "SUSE Bug 1011290 for CVE-2016-9441", "url": "https://bugzilla.suse.com/1011290" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9441", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9441" }, { "cve": "CVE-2016-9442", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9442" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause memory corruption in certain conditions via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9442", "url": "https://www.suse.com/security/cve/CVE-2016-9442" }, { "category": "external", "summary": "SUSE Bug 1011291 for CVE-2016-9442", "url": "https://bugzilla.suse.com/1011291" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9442", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9442" }, { "cve": "CVE-2016-9443", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9443" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9443", "url": "https://www.suse.com/security/cve/CVE-2016-9443" }, { "category": "external", "summary": "SUSE Bug 1011292 for CVE-2016-9443", "url": "https://bugzilla.suse.com/1011292" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9443", "url": "https://bugzilla.suse.com/1011293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9443" }, { "cve": "CVE-2016-9621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9621" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-9429. Reason: This candidate is a reservation duplicate of CVE-2016-9429. Notes: All CVE users should reference CVE-2016-9429 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9621", "url": "https://www.suse.com/security/cve/CVE-2016-9621" }, { "category": "external", "summary": "SUSE Bug 1011278 for CVE-2016-9621", "url": "https://bugzilla.suse.com/1011278" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9621", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012020 for CVE-2016-9621", "url": "https://bugzilla.suse.com/1012020" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9621" }, { "cve": "CVE-2016-9622", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9622" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9622", "url": "https://www.suse.com/security/cve/CVE-2016-9622" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9622", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012021 for CVE-2016-9622", "url": "https://bugzilla.suse.com/1012021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9622" }, { "cve": "CVE-2016-9623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9623" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9623", "url": "https://www.suse.com/security/cve/CVE-2016-9623" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9623", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012022 for CVE-2016-9623", "url": "https://bugzilla.suse.com/1012022" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9623" }, { "cve": "CVE-2016-9624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9624" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9624", "url": "https://www.suse.com/security/cve/CVE-2016-9624" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9624", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012023 for CVE-2016-9624", "url": "https://bugzilla.suse.com/1012023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9624" }, { "cve": "CVE-2016-9625", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9625" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9625", "url": "https://www.suse.com/security/cve/CVE-2016-9625" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9625", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012024 for CVE-2016-9625", "url": "https://bugzilla.suse.com/1012024" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9625" }, { "cve": "CVE-2016-9626", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9626" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9626", "url": "https://www.suse.com/security/cve/CVE-2016-9626" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9626", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012025 for CVE-2016-9626", "url": "https://bugzilla.suse.com/1012025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9626" }, { "cve": "CVE-2016-9627", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9627" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (heap buffer overflow and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9627", "url": "https://www.suse.com/security/cve/CVE-2016-9627" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9627", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012026 for CVE-2016-9627", "url": "https://bugzilla.suse.com/1012026" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9627" }, { "cve": "CVE-2016-9628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9628" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9628", "url": "https://www.suse.com/security/cve/CVE-2016-9628" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9628", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012027 for CVE-2016-9628", "url": "https://bugzilla.suse.com/1012027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9628" }, { "cve": "CVE-2016-9629", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9629" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9629", "url": "https://www.suse.com/security/cve/CVE-2016-9629" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9629", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012028 for CVE-2016-9629", "url": "https://bugzilla.suse.com/1012028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9629" }, { "cve": "CVE-2016-9630", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9630" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9630", "url": "https://www.suse.com/security/cve/CVE-2016-9630" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9630", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012029 for CVE-2016-9630", "url": "https://bugzilla.suse.com/1012029" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9630" }, { "cve": "CVE-2016-9631", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9631" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9631", "url": "https://www.suse.com/security/cve/CVE-2016-9631" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9631", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012030 for CVE-2016-9631", "url": "https://bugzilla.suse.com/1012030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9631" }, { "cve": "CVE-2016-9632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9632" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9632", "url": "https://www.suse.com/security/cve/CVE-2016-9632" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9632", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012031 for CVE-2016-9632", "url": "https://bugzilla.suse.com/1012031" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9632" }, { "cve": "CVE-2016-9633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9633" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (infinite loop and resource consumption) via a crafted HTML page.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9633", "url": "https://www.suse.com/security/cve/CVE-2016-9633" }, { "category": "external", "summary": "SUSE Bug 1011293 for CVE-2016-9633", "url": "https://bugzilla.suse.com/1011293" }, { "category": "external", "summary": "SUSE Bug 1012032 for CVE-2016-9633", "url": "https://bugzilla.suse.com/1012032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-0.5.3.git20161120-1.1.x86_64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.aarch64", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.ppc64le", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.s390x", "openSUSE Tumbleweed:w3m-inline-image-0.5.3.git20161120-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9633" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…