-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Thu, 24 Nov 2016 19:49:18 +0900 Source: w3m Binary: w3m w3m-img Architecture: source amd64 Version: 0.5.3-19+deb8u1 Distribution: jessie Urgency: medium Maintainer: Tatsuya Kinoshita <t...@debian.org> Changed-By: Tatsuya Kinoshita <t...@debian.org> Description: w3m - WWW browsable pager with excellent tables/frames support w3m-img - inline image extension support utilities for w3m Closes: 820162 820373 844726 Changes: w3m (0.5.3-19+deb8u1) jessie; urgency=medium . * New patch 901_ucsmap.patch to fix array index (closes: #820162) * New patch 902_johab1.patch to fix array index (closes: #820373) * New patch 903_input-type.patch to fix null deref [CVE-2016-9430] * New patch 904_form-update.patch to fix overflow [CVE-2016-9423] [CVE-2016-9431] * New patch 905_textarea.patch to fix heap write [CVE-2016-9424] * New patch 906_form-update.patch to fix bcopy size [CVE-2016-9432] * New patch 907_iso2022.patch to fix array index [CVE-2016-9433] * New patch 908_forms.patch to fix null deref [CVE-2016-9434] * New patch 909_button-type.patch to fix rodata write [CVE-2016-9437] * New patch 910_input-alt.patch to fix null deref [CVE-2016-9438] * New patch 911_rowcolspan.patch to fix stack smashing [CVE-2016-9422] * New patch 912_i-dd.patch to fix uninit values [CVE-2016-9435] [CVE-2016-9436] * New patch 913_tabwidth.patch to fix heap corruption [CVE-2016-9426] * New patch 914_curline.patch to fix near-null deref [CVE-2016-9440] * New patch 915_table-alt.patch to fix near-null deref [CVE-2016-9441] * New patch 916_anchor.patch to fix heap write [CVE-2016-9425] [CVE-2016-9428] * New patch 917_strgrow.patch to fix potential heap buffer corruption [CVE-2016-9442] * New patch 918_form-value.patch to fix null deref [CVE-2016-9443] * New patch 919_form-update.patch to fix buffer overflow [CVE-2016-9429] [CVE-2016-9621] * New patch 920_table.patch to fix stack overflow [CVE-2016-9439] (closes: #844726) * New patch 921_cotable.patch to fix null deref (additional fix for #844726) * New patch 922_lineproc.patch to fix null deref [CVE-2016-9622] * New patch 923_tagproc.patch to fix null deref [CVE-2016-9623] * New patch 924_curline.patch to fix near-null deref [CVE-2016-9624] * New patch 925_lineproc.patch to fix stack overflow [CVE-2016-9625] * New patch 926_indent-level.patch to fix stack overflow [CVE-2016-9626] * New patch 927_symbol.patch to fix array index [CVE-2016-9627] * New patch 928_form-id.patch to fix null deref [CVE-2016-9628] * New patch 929_anchor.patch to fix null deref [CVE-2016-9629] * New patch 930_tbl-mode.patch to fix null deref [CVE-2016-9631] * New patch 931_parse-url.patch to fix buffer overflow [CVE-2016-9630] * New patch 932_ucsmap.patch to fix buffer overflow [CVE-2016-9632] * New patch 933_table-level.patch to fix out of memory [CVE-2016-9633] Checksums-Sha1: 6bb15dea070c42796a7c04d93d9970e27b1caea2 2074 w3m_0.5.3-19+deb8u1.dsc 3f05a22dd45d5f23e8eeec3d5c9a5943f7cb766a 102744 w3m_0.5.3-19+deb8u1.debian.tar.xz 8bd8410e40aac44f436be655fac545f193a0adfb 991950 w3m_0.5.3-19+deb8u1_amd64.deb a0a3987365a1f38d98a3d3969560375eb29fa091 119606 w3m-img_0.5.3-19+deb8u1_amd64.deb Checksums-Sha256: a108a9c9dd410b3f0e8d1d5e2b259188a4d7290768b6e64bc2f635bc9c26ab41 2074 w3m_0.5.3-19+deb8u1.dsc 8e419b56c4a3592074f35b785e77f83d55c96b9580ee1d1276076c0cefd93382 102744 w3m_0.5.3-19+deb8u1.debian.tar.xz 9ba74d403f3549f3bb9f3eec2667c8284b821204c377e45c85bf805ccb278f11 991950 w3m_0.5.3-19+deb8u1_amd64.deb ae86359518bc1a0b542e4f58999eeefce85677b783c42672e72cb85733b430c8 119606 w3m-img_0.5.3-19+deb8u1_amd64.deb Files: c1922ce8a64a4743ced11a2309fc0a05 2074 web standard w3m_0.5.3-19+deb8u1.dsc 671b3bf50a60b8152919416317630af0 102744 web standard w3m_0.5.3-19+deb8u1.debian.tar.xz ea0309940a2bf6bbea5d715df6d629a0 991950 web standard w3m_0.5.3-19+deb8u1_amd64.deb 17266a3930c72911e70b0d1edc467a84 119606 web optional w3m-img_0.5.3-19+deb8u1_amd64.deb
-----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEAxxiPZTvHz7xexyE5e+rkAgOpjwFAlhWsCAACgkQ5e+rkAgO pjxWOA/+P2d345rlycHVexOU9+LuFGZxSvOQN7QrtMBjo6UW7RInWdLJ8y5yutkC JYQAvyJD4erimnic4WprSfv6Av6LL+HBp9SDkViXXthLfaxkvs+YcRfGqh0BSK++ VoyWjgmec2csddPi2WjBkWS/J1URLd2HUgQiPidyUk2+ugPlyt2AABBhPjQshZxH AeFRzy/b1Odem5gkEN1Z2ioHaAAnGTFDTtf557S70bmo9ugGmECABPpHt2p1B3t4 UlQJpol9A+HEZiSE5/8+PYM6tk/vopHJPPsADaI8o2rfJAkY3EY5UZDFd53kwFKu 2d/WccMfVT2aByCUJB4aGoY0jwv0UeyQS1/6atsYbrlObh5wju3qClBjAfj8bSSM SeVQzTxoF9gIm/igN71aejPaEkAEOZ5f668/+MvIEBq+9qYCgi2S2oszJfGRfCkb queZ7fK8FYoXquU0btscab0yYb5nwmISh7SmcpHBYf4F/oDI0t2b05xTMEZTk1nf Qm851sMlCgG0s+vxcOm9pxRzOToIBv7YhBTFz5+hPP5pB8qOb/91dOUQpauTmTJP oIMP56SYBtBzUOsAoFrowAzF9fvdF/5l5KsUmuc67ycv5EXO9BQjARb5r8MGpma2 yw6CRPv1bNYDOxNcRI9U/kPejo/PfErjYloB3s8MOGLokXCJ+zs= =MREH -----END PGP SIGNATURE-----