Back to w3m PTS page

Accepted w3m 0.5.3-19+deb8u1 (source amd64) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 24 Nov 2016 19:49:18 +0900
Source: w3m
Binary: w3m w3m-img
Architecture: source amd64
Version: 0.5.3-19+deb8u1
Distribution: jessie
Urgency: medium
Maintainer: Tatsuya Kinoshita <tats@debian.org>
Changed-By: Tatsuya Kinoshita <tats@debian.org>
Description:
 w3m        - WWW browsable pager with excellent tables/frames support
 w3m-img    - inline image extension support utilities for w3m
Closes: 820162 820373 844726
Changes:
 w3m (0.5.3-19+deb8u1) jessie; urgency=medium
 .
   * New patch 901_ucsmap.patch to fix array index (closes: #820162)
   * New patch 902_johab1.patch to fix array index (closes: #820373)
   * New patch 903_input-type.patch to fix null deref [CVE-2016-9430]
   * New patch 904_form-update.patch to fix overflow
     [CVE-2016-9423] [CVE-2016-9431]
   * New patch 905_textarea.patch to fix heap write [CVE-2016-9424]
   * New patch 906_form-update.patch to fix bcopy size [CVE-2016-9432]
   * New patch 907_iso2022.patch to fix array index [CVE-2016-9433]
   * New patch 908_forms.patch to fix null deref [CVE-2016-9434]
   * New patch 909_button-type.patch to fix rodata write [CVE-2016-9437]
   * New patch 910_input-alt.patch to fix null deref [CVE-2016-9438]
   * New patch 911_rowcolspan.patch to fix stack smashing [CVE-2016-9422]
   * New patch 912_i-dd.patch to fix uninit values
     [CVE-2016-9435] [CVE-2016-9436]
   * New patch 913_tabwidth.patch to fix heap corruption [CVE-2016-9426]
   * New patch 914_curline.patch to fix near-null deref [CVE-2016-9440]
   * New patch 915_table-alt.patch to fix near-null deref [CVE-2016-9441]
   * New patch 916_anchor.patch to fix heap write
     [CVE-2016-9425] [CVE-2016-9428]
   * New patch 917_strgrow.patch to fix potential heap buffer corruption
     [CVE-2016-9442]
   * New patch 918_form-value.patch to fix null deref [CVE-2016-9443]
   * New patch 919_form-update.patch to fix buffer overflow
     [CVE-2016-9429] [CVE-2016-9621]
   * New patch 920_table.patch to fix stack overflow [CVE-2016-9439]
     (closes: #844726)
   * New patch 921_cotable.patch to fix null deref
     (additional fix for #844726)
   * New patch 922_lineproc.patch to fix null deref [CVE-2016-9622]
   * New patch 923_tagproc.patch to fix null deref [CVE-2016-9623]
   * New patch 924_curline.patch to fix near-null deref [CVE-2016-9624]
   * New patch 925_lineproc.patch to fix stack overflow [CVE-2016-9625]
   * New patch 926_indent-level.patch to fix stack overflow [CVE-2016-9626]
   * New patch 927_symbol.patch to fix array index [CVE-2016-9627]
   * New patch 928_form-id.patch to fix null deref [CVE-2016-9628]
   * New patch 929_anchor.patch to fix null deref [CVE-2016-9629]
   * New patch 930_tbl-mode.patch to fix null deref [CVE-2016-9631]
   * New patch 931_parse-url.patch to fix buffer overflow [CVE-2016-9630]
   * New patch 932_ucsmap.patch to fix buffer overflow [CVE-2016-9632]
   * New patch 933_table-level.patch to fix out of memory [CVE-2016-9633]
Checksums-Sha1:
 6bb15dea070c42796a7c04d93d9970e27b1caea2 2074 w3m_0.5.3-19+deb8u1.dsc
 3f05a22dd45d5f23e8eeec3d5c9a5943f7cb766a 102744 w3m_0.5.3-19+deb8u1.debian.tar.xz
 8bd8410e40aac44f436be655fac545f193a0adfb 991950 w3m_0.5.3-19+deb8u1_amd64.deb
 a0a3987365a1f38d98a3d3969560375eb29fa091 119606 w3m-img_0.5.3-19+deb8u1_amd64.deb
Checksums-Sha256:
 a108a9c9dd410b3f0e8d1d5e2b259188a4d7290768b6e64bc2f635bc9c26ab41 2074 w3m_0.5.3-19+deb8u1.dsc
 8e419b56c4a3592074f35b785e77f83d55c96b9580ee1d1276076c0cefd93382 102744 w3m_0.5.3-19+deb8u1.debian.tar.xz
 9ba74d403f3549f3bb9f3eec2667c8284b821204c377e45c85bf805ccb278f11 991950 w3m_0.5.3-19+deb8u1_amd64.deb
 ae86359518bc1a0b542e4f58999eeefce85677b783c42672e72cb85733b430c8 119606 w3m-img_0.5.3-19+deb8u1_amd64.deb
Files:
 c1922ce8a64a4743ced11a2309fc0a05 2074 web standard w3m_0.5.3-19+deb8u1.dsc
 671b3bf50a60b8152919416317630af0 102744 web standard w3m_0.5.3-19+deb8u1.debian.tar.xz
 ea0309940a2bf6bbea5d715df6d629a0 991950 web standard w3m_0.5.3-19+deb8u1_amd64.deb
 17266a3930c72911e70b0d1edc467a84 119606 web optional w3m-img_0.5.3-19+deb8u1_amd64.deb

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEAxxiPZTvHz7xexyE5e+rkAgOpjwFAlhWsCAACgkQ5e+rkAgO
pjxWOA/+P2d345rlycHVexOU9+LuFGZxSvOQN7QrtMBjo6UW7RInWdLJ8y5yutkC
JYQAvyJD4erimnic4WprSfv6Av6LL+HBp9SDkViXXthLfaxkvs+YcRfGqh0BSK++
VoyWjgmec2csddPi2WjBkWS/J1URLd2HUgQiPidyUk2+ugPlyt2AABBhPjQshZxH
AeFRzy/b1Odem5gkEN1Z2ioHaAAnGTFDTtf557S70bmo9ugGmECABPpHt2p1B3t4
UlQJpol9A+HEZiSE5/8+PYM6tk/vopHJPPsADaI8o2rfJAkY3EY5UZDFd53kwFKu
2d/WccMfVT2aByCUJB4aGoY0jwv0UeyQS1/6atsYbrlObh5wju3qClBjAfj8bSSM
SeVQzTxoF9gIm/igN71aejPaEkAEOZ5f668/+MvIEBq+9qYCgi2S2oszJfGRfCkb
queZ7fK8FYoXquU0btscab0yYb5nwmISh7SmcpHBYf4F/oDI0t2b05xTMEZTk1nf
Qm851sMlCgG0s+vxcOm9pxRzOToIBv7YhBTFz5+hPP5pB8qOb/91dOUQpauTmTJP
oIMP56SYBtBzUOsAoFrowAzF9fvdF/5l5KsUmuc67ycv5EXO9BQjARb5r8MGpma2
yw6CRPv1bNYDOxNcRI9U/kPejo/PfErjYloB3s8MOGLokXCJ+zs=
=MREH
-----END PGP SIGNATURE-----