Summary: | <www-client/epiphany-2.22.3-r2 Untrusted search path vulnerability (CVE-2008-5985) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | gnome |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504363 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 256619 | ||
Bug Blocks: |
Description
Stefan Behte (RETIRED)
![]() ![]() I am not sure whether this bug is being tracked upstream. Please see the blocker for details and a patch example. Debian patch: http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=sanitize_sys.path.diff;att=1;bug=504363 2.22.3-r2 and 2.22.3-r12 are in the tree. Arches, please test and mark stable: =www-client/epiphany-2.22.3-r2 Target keywords : "alpha amd64 hppa ia64 ppc ppc64 sparc x86" Sparc stable, seems fine (tested with USE=xulrunner). amd64/x86 stable alpha/ia64 stable Stable for HPPA. ppc and ppc64 done GLSA 200903-16 |