Package: w3m / 0.5.3-19+deb8u2
Metadata
| Package | Version | Patches format |
|---|---|---|
| w3m | 0.5.3-19+deb8u2 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| 923_tagproc.patch | (download) |
file.c |
6 6 + 0 - 0 ! |
prevent crash after allocate string of negative size |
| 924_curline.patch | (download) |
form.c |
3 2 + 1 - 0 ! |
prevent dereference near-null pointer in formupdatebuffer |
| 925_lineproc.patch | (download) |
file.c |
16 8 + 8 - 0 ! |
prevent infinite recursion in htmllineproc0 |
| 926_indent level.patch | (download) |
table.c |
2 2 + 0 - 0 ! |
check indent_level to prevent infinite recursion |
| 927_symbol.patch | (download) |
display.c |
8 4 + 4 - 0 ! |
prevent array index out of bounds for symbol |
| 928_form id.patch | (download) |
file.c |
5 4 + 1 - 0 ! |
prevent null pointer deref due to bad form id |
| 929_anchor.patch | (download) |
anchor.c |
2 1 + 1 - 0 ! |
prevent deref null pointer in shiftanchorposition() |
| 930_tbl mode.patch | (download) |
file.c |
10 5 + 5 - 0 ! |
prevent deref null pointer in htmllineproc0() |
| 931_parse url.patch | (download) |
url.c |
5 4 + 1 - 0 ! |
prevent global-buffer-overflow in parseurl() |
| 932_ucsmap.patch | (download) |
libwc/ucs.c |
1 1 + 0 - 0 ! |
prevent global-buffer-overflow in wc_any_to_ucs() |
| 933_table level.patch | (download) |
file.c |
3 3 + 0 - 0 ! |
prevent memory exhausted due to repeat appending "</table>" |
| 934_menu.patch | (download) |
menu.c |
2 1 + 1 - 0 ! |
fix menu buffer-overflow |
| 935_shiftanchor.patch | (download) |
anchor.c |
3 2 + 1 - 0 ! |
prevent negative array index for marks in shiftanchorposition() |
| 936_metarefresh.patch | (download) |
file.c |
5 3 + 2 - 0 ! |
prevent negative array index in getmetarefreshparam() |
| 937_lineproc0.patch | (download) |
file.c |
2 2 + 0 - 0 ! |
prevent negative value of row for pushtable() in htmllineproc0() |
| 938_lineproc2body.patch | (download) |
file.c |
2 1 + 1 - 0 ! |
prevent negative array index for marks in htmllineproc2body() |
| 939_textarea.patch | (download) |
file.c |
2 1 + 1 - 0 ! |
prevent negative array index in process_textarea() |
| 940_tabattr.patch | (download) |
table.c |
2 1 + 1 - 0 ! |
prevent array index out of bounds for tabattr in feed_table_tag() |
| 941_integeredwidth.patch | (download) |
table.c |
4 2 + 2 - 0 ! |
prevent negative array index in set_integered_width() |
| 942_tridvalue.patch | (download) |
table.c |
4 3 + 1 - 0 ! |
prevent array index out of bounds for tridvalue in feed_table_tag() |
| 943_pushlink.patch | (download) |
file.c |
8 6 + 2 - 0 ! |
prevent negative values for offset and pos in push_link() |
| 944_lineproc0.patch | (download) |
file.c |
3 2 + 1 - 0 ! |
prevent heap-use-after-free in htmllineproc0() |
| 945_wtfstrwidth.patch | (download) |
libwc/wtf.c |
6 4 + 2 - 0 ! |
prevent overflow beyond the end of string in wtf_strwidth() and wtf_len() |
| 946_strnewsize.patch | (download) |
Str.c |
2 2 + 0 - 0 ! |
prevent heap-buffer-overflow in strnew_size() |
| 947_realcolumn.patch | (download) |
etc.c |
2 1 + 1 - 0 ! |
prevent negative array index for realcolumn in calcposition() |
| 948_getmclen.patch | (download) |
file.c |
2 1 + 1 - 0 ! |
prevent overflow beyond the end of string in caller of get_mclen() |
| 949_wtftowcs.patch | (download) |
libwc/wtf.c |
6 4 + 2 - 0 ! |
prevent overflow beyond the end of string for wtf to wcs macros |
| 950_textarea.patch | (download) |
file.c |
4 3 + 1 - 0 ! |
prevent infinite loop in feed_textarea() |
| 951_lineproc0.patch | (download) |
file.c |
2 1 + 1 - 0 ! |
prevent heap-use-after-free read in htmllineproc0() |
| 952_formupdatebuffer.patch | (download) |
form.c |
3 2 + 1 - 0 ! |
prevent invalid form_update_line() call in formupdatebuffer() |
| 953_formupdateline.patch | (download) |
form.c |
3 2 + 1 - 0 ! |
preserve one byte for end of string character in form_update_line() |
| 954_wtfparse1.patch | (download) |
libwc/wtf.c |
44 32 + 12 - 0 ! |
prevent overflow beyond the end of string in wtf_parse1() |
