Summary: | <www-client/epiphany-42.4: client buffer overflow via a long page title (CVE-2022-29536) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | filip ambroz <filip.ambroz> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1106 | ||
Whiteboard: | A3 [glsa+] | ||
Package list: | Runtime testing required: | --- |
Description
filip ambroz
2022-04-21 07:18:10 UTC
All stable and cleaned. Thanks! The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=7a69d7abb7e2d4eb863dde1c092868d0df7cccbd commit 7a69d7abb7e2d4eb863dde1c092868d0df7cccbd Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2024-05-08 09:47:31 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2024-05-08 09:47:50 +0000 [ GLSA 202405-27 ] Epiphany: Buffer Overflow Bug: https://bugs.gentoo.org/839786 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202405-27.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) |