Updated epiphany packages fix security vulnerability
Publication date: 09 Feb 2022Modification date: 09 Feb 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-45085 , CVE-2021-45086 , CVE-2021-45087 , CVE-2021-45088
Description
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1
via an about: page, as demonstrated by ephy-about:overview when a user
visits an XSS payload page often enough to place that page on the Most
Visited list (CVE-2021-45085).
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1
because a server's suggested_filename is used as the pdf_name value in
PDF.js (CVE-2021-45086).
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1
when View Source mode or Reader mode is used, as demonstrated by a a page
title (CVE-2021-45087).
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1
via an error page (CVE-2021-45088).
References
- https://bugs.mageia.org/show_bug.cgi?id=29886
- https://www.debian.org/security/2022/dsa-5042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45087
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45088
SRPMS
8/core
- epiphany-3.38.2-1.1.mga8