w3m through 0.5.3 is prone to a NULL pointer dereference flaw in formUpdateBuffer in form.c.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/102846 | third party advisory vdb entry |
https://usn.ubuntu.com/3555-2/ | third party advisory vendor advisory |
https://github.com/tats/w3m/issues/89 | patch third party advisory exploit |
https://usn.ubuntu.com/3555-1/ | third party advisory vendor advisory |
https://github.com/tats/w3m/commit/7fdc83b0364005a0b5ed869230dd81752ba022e8 | third party advisory patch |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00028.html | vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/04/msg00025.html | mailing list |