Bug 1012031 - (CVE-2016-9632) VUL-0: CVE-2016-9632: w3m: global-buffer-overflow read
(CVE-2016-9632)
VUL-0: CVE-2016-9632: w3m: global-buffer-overflow read
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Thomas Blume
Security Team bot
https://smash.suse.de/issue/176732/
CVSSv2:SUSE:CVE-2016-9632:4.3:(AV:N/A...
:
Depends on:
Blocks: 1011293
  Show dependency treegraph
 
Reported: 2016-11-24 08:27 UTC by Alexander Bergmann
Modified: 2018-10-06 22:42 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Swamp Workflow Management 2016-11-24 23:02:19 UTC
bugbot adjusting priority
Comment 2 Swamp Workflow Management 2016-12-07 19:15:01 UTC
SUSE-SU-2016:3046-1: An update that fixes 28 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1011269,1011270,1011271,1011272,1011283,1011284,1011285,1011286,1011287,1011288,1011289,1011290,1011291,1011292,1011293,1012020,1012021,1012022,1012023,1012024,1012025,1012026,1012027,1012028,1012029,1012030,1012031,1012032
CVE References: CVE-2010-2074,CVE-2016-9422,CVE-2016-9423,CVE-2016-9424,CVE-2016-9425,CVE-2016-9434,CVE-2016-9435,CVE-2016-9436,CVE-2016-9437,CVE-2016-9438,CVE-2016-9439,CVE-2016-9440,CVE-2016-9441,CVE-2016-9442,CVE-2016-9443,CVE-2016-9621,CVE-2016-9622,CVE-2016-9623,CVE-2016-9624,CVE-2016-9625,CVE-2016-9626,CVE-2016-9627,CVE-2016-9628,CVE-2016-9629,CVE-2016-9630,CVE-2016-9631,CVE-2016-9632,CVE-2016-9633
Sources used:
SUSE Linux Enterprise Server 11-SP4 (src):    w3m-0.5.3.git20161120-4.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    w3m-0.5.3.git20161120-4.1
Comment 3 Swamp Workflow Management 2016-12-08 13:12:12 UTC
SUSE-SU-2016:3053-1: An update that fixes 23 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1011283,1011284,1011285,1011286,1011287,1011288,1011289,1011290,1011291,1011292,1011293,1012021,1012022,1012023,1012024,1012025,1012026,1012027,1012028,1012029,1012030,1012031,1012032
CVE References: CVE-2016-9434,CVE-2016-9435,CVE-2016-9436,CVE-2016-9437,CVE-2016-9438,CVE-2016-9439,CVE-2016-9440,CVE-2016-9441,CVE-2016-9442,CVE-2016-9443,CVE-2016-9621,CVE-2016-9622,CVE-2016-9623,CVE-2016-9624,CVE-2016-9625,CVE-2016-9626,CVE-2016-9627,CVE-2016-9628,CVE-2016-9629,CVE-2016-9630,CVE-2016-9631,CVE-2016-9632,CVE-2016-9633
Sources used:
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src):    w3m-0.5.3.git20161120-160.1
SUSE Linux Enterprise Server 12-SP2 (src):    w3m-0.5.3.git20161120-160.1
SUSE Linux Enterprise Server 12-SP1 (src):    w3m-0.5.3.git20161120-160.1
SUSE Linux Enterprise Desktop 12-SP2 (src):    w3m-0.5.3.git20161120-160.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    w3m-0.5.3.git20161120-160.1
Comment 4 Swamp Workflow Management 2016-12-14 00:11:00 UTC
openSUSE-SU-2016:3121-1: An update that fixes 23 vulnerabilities is now available.

Category: security (moderate)
Bug References: 1011283,1011284,1011285,1011286,1011287,1011288,1011289,1011290,1011291,1011292,1011293,1012021,1012022,1012023,1012024,1012025,1012026,1012027,1012028,1012029,1012030,1012031,1012032
CVE References: CVE-2016-9434,CVE-2016-9435,CVE-2016-9436,CVE-2016-9437,CVE-2016-9438,CVE-2016-9439,CVE-2016-9440,CVE-2016-9441,CVE-2016-9442,CVE-2016-9443,CVE-2016-9621,CVE-2016-9622,CVE-2016-9623,CVE-2016-9624,CVE-2016-9625,CVE-2016-9626,CVE-2016-9627,CVE-2016-9628,CVE-2016-9629,CVE-2016-9630,CVE-2016-9631,CVE-2016-9632,CVE-2016-9633
Sources used:
openSUSE Leap 42.2 (src):    w3m-0.5.3.git20161120-160.1
openSUSE Leap 42.1 (src):    w3m-0.5.3.git20161120-161.1
Comment 5 Thomas Blume 2017-05-11 08:00:48 UTC
closing
Comment 6 Swamp Workflow Management 2017-06-02 11:43:38 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2017-06-16.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/63652