A flaw was found in ephy-session.c in libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via JavaScript code that triggers access to a NULL URL, as demonstrated by a crafted window.open call. Gentoo Security Scout Florian Schuhmacher
Fix is backported to 3.26.7, I guess lets just use that instead of backporting to 3.24.
x86 stable
amd64 stable. Maintainer(s), please cleanup. Security, please vote.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=80954e9697477e00ac3c4734ac6cc2f5bc36c4ec commit 80954e9697477e00ac3c4734ac6cc2f5bc36c4ec Author: Mart Raudsepp <leio@gentoo.org> AuthorDate: 2018-10-06 18:38:58 +0000 Commit: Mart Raudsepp <leio@gentoo.org> CommitDate: 2018-10-06 18:38:58 +0000 www-client/epiphany: security cleanup Bug: https://bugs.gentoo.org/658376 Signed-off-by: Mart Raudsepp <leio@gentoo.org> Package-Manager: Portage-2.3.49, Repoman-2.3.11 www-client/epiphany/Manifest | 1 - www-client/epiphany/epiphany-3.24.5.ebuild | 75 ---------------------- .../files/epiphany-3.14.0-unittest-2.patch | 45 ------------- .../files/epiphany-3.16.0-unittest-1.patch | 30 --------- 4 files changed, 151 deletions(-)
tree is clean