A heap corruption due to integer overflow will occur in w3m while parsing maliciously crafted input. Upstream bug: https://github.com/tats/w3m/issues/25 Upstream fix: https://github.com/tats/w3m/commit/b910f0966d9efea93ea8cef491000a83ffb49c5e References: http://seclists.org/oss-sec/2016/q4/321
Created w3m tracking bugs for this issue: Affects: fedora-all [bug 1401423] Affects: epel-7 [bug 1401424]