From 7a69d7abb7e2d4eb863dde1c092868d0df7cccbd Mon Sep 17 00:00:00 2001 From: GLSAMaker Date: Wed, 8 May 2024 09:47:31 +0000 Subject: [ GLSA 202405-27 ] Epiphany: Buffer Overflow Bug: https://bugs.gentoo.org/839786 Signed-off-by: GLSAMaker Signed-off-by: Hans de Graaff --- glsa-202405-27.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 glsa-202405-27.xml diff --git a/glsa-202405-27.xml b/glsa-202405-27.xml new file mode 100644 index 00000000..eb832653 --- /dev/null +++ b/glsa-202405-27.xml @@ -0,0 +1,42 @@ + + + + Epiphany: Buffer Overflow + A vulnerability has been discovered in Epiphany, which can lead to a buffer overflow. + epiphany + 2024-05-08 + 2024-05-08 + 839786 + remote + + + 42.4 + 42.4 + + + +

Epiphany is a GNOME webbrowser based on the Mozilla rendering engine Gecko.

+
+ +

A vulnerability has been discovered in Epiphany. Please review the CVE identifier referenced below for details.

+
+ +

In GNOME Epiphany an HTML document can trigger a client buffer overflow (in ephy_string_shorten) via a long page title. The issue occurs because the number of bytes for a UTF-8 ellipsis character is not properly considered.

+
+ +

There is no known workaround at this time.

+
+ +

All Epiphany users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/epiphany-42.4" + +
+ + CVE-2022-29536 + + graaff + graaff +
\ No newline at end of file -- cgit v1.2.3-65-gdbad