vulnerability
Arch Linux: Arbitrary code execution (CVE-2016-9435)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:N/A:P) | Jan 20, 2017 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
Published
Jan 20, 2017
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Multiple issues have been discovered related to uninitialized values for <i> and <dd> HTML elements. A missing PUSH_ENV(HTML_DL) call is leading to a conditional jump or move depending on an uninitialized value resulting in a stack overflow vulnerability.
Solution
arch-linux-upgrade-latest
References
- CVE-2016-9435
- https://attackerkb.com/topics/CVE-2016-9435
- URL-http://lists.opensuse.org/opensuse-updates/2016-12/msg00084.html
- URL-http://www.openwall.com/lists/oss-security/2016/11/18/3
- URL-http://www.securityfocus.com/bid/94407
- URL-https://github.com/tats/w3m/commit/33509cc81ec5f2ba44eb6fd98bd5c1b5873e46bd
- URL-https://github.com/tats/w3m/issues/16
- URL-https://security.archlinux.org/ASA-201611-18
- URL-https://security.gentoo.org/glsa/201701-08
- CWE-20
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.