| Summary: | epiphany new security issue CVE-2023-26081 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, nicolas.salguero, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | epiphany-3.38.2-1.2.mga8.src.rpm | CVE: | CVE-2023-26081 |
| Status comment: | |||
|
Description
David Walser
2023-02-27 16:42:08 CET
David Walser
2023-02-27 16:42:25 CET
Status comment:
(none) =>
Fixed upstream in 43.1 Suggested advisory: ======================== The updated package fixes a security vulnerability: In Epiphany (aka GNOME Web) through 43.0, untrusted web content can trick users into exfiltrating passwords, because autofill occurs in sandboxed contexts. (CVE-2023-26081) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26081 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SADQCSQKTJKTTIJMEPY7GII6IVQSKEKV/ ======================== Updated package in core/updates_testing: ======================== epiphany-3.38.2-1.3.mga8 from SRPM: epiphany-3.38.2-1.3.mga8.src.rpm Source RPM:
epiphany-43.0-1.mga9.src.rpm =>
epiphany-3.38.2-1.2.mga8.src.rpm I don't normally use Gnome, but I do have a VirtualBox guest for just this purpose. No installation issues. Looked at a few web pages, played a Youtube video, no issues. This looks OK to me. Validating. Advisory in Comment 1. Keywords:
(none) =>
validated_update
Dave Hodgins
2023-03-17 23:15:36 CET
CC:
(none) =>
davidwhodgins An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2023-0099.html Status:
ASSIGNED =>
RESOLVED |