ALT-BU-2021-4730-1
Branch p10 update bulletin.
Closed vulnerabilities
BDU:2021-06051
Уязвимость компонента BFCache браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06100
Уязвимость расширений браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06101
Уязвимость компонента UI браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06102
Уязвимость веб-приложений браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06117
Уязвимость реализации компонента «New Tab Page» («Новая вкладка») браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать влияние на доступность данных или вызвать отказ в обслуживании
BDU:2021-06118
Уязвимость реализации функции автозаполнения Autofill браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06119
Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06120
Уязвимость загрузчика браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2021-06132
Уязвимость обработчика JavaScript-сценариев V8 браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06136
Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06137
Уязвимость компонента автодополнения Autofill браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2021-06151
Уязвимость расширения Window Manager браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06157
Уязвимость набора инструментов для веб-разработки DevTools браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06163
Уязвимость функции захват экрана (Screen Capture) браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06243
Уязвимость библиотеки SwiftShader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06244
Уязвимость библиотеки SwiftShader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06260
Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06261
Уязвимость компонента loader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06276
Уязвимость библиотеки передачи сообщений Mojo браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06277
Уязвимость обработчика JavaScript-сценариев V8 браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-00081
Уязвимость интерфейса API браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-00082
Уязвимость расширения WebRTC браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-00091
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2021-4052
Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1267661
- https://crbug.com/1267661
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4053
Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1267791
- https://crbug.com/1267791
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4054
Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1239760
- https://crbug.com/1239760
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4055
Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1266510
- https://crbug.com/1266510
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4056
Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1260939
- https://crbug.com/1260939
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4057
Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html
- http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1262183
- https://crbug.com/1262183
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4058
Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1267496
- https://crbug.com/1267496
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4059
Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1270990
- https://crbug.com/1270990
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4061
Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1271456
- https://crbug.com/1271456
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4062
Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1272403
- https://crbug.com/1272403
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4063
Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1273176
- https://crbug.com/1273176
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4064
Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1273197
- https://crbug.com/1273197
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4065
Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1273674
- https://crbug.com/1273674
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4066
Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1274499
- https://crbug.com/1274499
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4067
Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1274641
- https://crbug.com/1274641
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4068
Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1265197
- https://crbug.com/1265197
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4078
Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-4079
Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.
Modified: 2024-11-21
CVE-2021-4098
Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-4099
Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-4100
Object lifecycle issue in ANGLE in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-4101
Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2025-03-13
CVE-2021-4102
Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Package python3-module-django updated to version 3.2.10-alt1 for branch p10 in task 292330.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-44420
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2022-e7fd530688
- FEDORA-2022-e7fd530688
- https://security.netapp.com/advisory/ntap-20211229-0006/
- https://security.netapp.com/advisory/ntap-20211229-0006/
- https://www.djangoproject.com/weblog/2021/dec/07/security-releases/
- https://www.djangoproject.com/weblog/2021/dec/07/security-releases/
- https://www.openwall.com/lists/oss-security/2021/12/07/1
- https://www.openwall.com/lists/oss-security/2021/12/07/1
Package xorg-server updated to version 1.20.13-alt5 for branch p10 in task 291987.
Closed vulnerabilities
BDU:2022-00346
Уязвимость функции SProcXFixesCreatePointerBarrier реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00347
Уязвимость функции SProcXFixesCreatePointerBarrier реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00348
Уязвимость функции SProcRenderCompositeGlyphs реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00349
Уязвимость функции SwapCreateRegister реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-4008
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- FEDORA-2021-69e96c8f68
- FEDORA-2021-69e96c8f68
- FEDORA-2021-664a6554a1
- FEDORA-2021-664a6554a1
- FEDORA-2021-2eb603951b
- FEDORA-2021-2eb603951b
- FEDORA-2021-a7fd510294
- FEDORA-2021-a7fd510294
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- GLSA-202305-30
- GLSA-202305-30
- https://security.netapp.com/advisory/ntap-20220114-0004/
- https://security.netapp.com/advisory/ntap-20220114-0004/
- DSA-5027
- DSA-5027
- https://www.zerodayinitiative.com/advisories/ZDI-21-1547/
- https://www.zerodayinitiative.com/advisories/ZDI-21-1547/
Modified: 2024-11-21
CVE-2021-4009
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- FEDORA-2021-69e96c8f68
- FEDORA-2021-69e96c8f68
- FEDORA-2021-664a6554a1
- FEDORA-2021-664a6554a1
- FEDORA-2021-2eb603951b
- FEDORA-2021-2eb603951b
- FEDORA-2021-a7fd510294
- FEDORA-2021-a7fd510294
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- GLSA-202305-30
- GLSA-202305-30
- https://security.netapp.com/advisory/ntap-20220114-0004/
- https://security.netapp.com/advisory/ntap-20220114-0004/
- DSA-5027
- DSA-5027
- https://www.zerodayinitiative.com/advisories/ZDI-21-1548/
- https://www.zerodayinitiative.com/advisories/ZDI-21-1548/
Modified: 2024-11-21
CVE-2021-4010
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- FEDORA-2021-69e96c8f68
- FEDORA-2021-69e96c8f68
- FEDORA-2021-664a6554a1
- FEDORA-2021-664a6554a1
- FEDORA-2021-2eb603951b
- FEDORA-2021-2eb603951b
- FEDORA-2021-a7fd510294
- FEDORA-2021-a7fd510294
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- GLSA-202305-30
- GLSA-202305-30
- https://security.netapp.com/advisory/ntap-20220114-0004/
- https://security.netapp.com/advisory/ntap-20220114-0004/
- DSA-5027
- DSA-5027
- https://www.zerodayinitiative.com/advisories/ZDI-21-1549/
- https://www.zerodayinitiative.com/advisories/ZDI-21-1549/
Modified: 2024-11-21
CVE-2021-4011
A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update
- FEDORA-2021-69e96c8f68
- FEDORA-2021-69e96c8f68
- FEDORA-2021-664a6554a1
- FEDORA-2021-664a6554a1
- FEDORA-2021-2eb603951b
- FEDORA-2021-2eb603951b
- FEDORA-2021-a7fd510294
- FEDORA-2021-a7fd510294
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003122.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- https://lists.x.org/archives/xorg-announce/2021-December/003124.html
- GLSA-202305-30
- GLSA-202305-30
- https://security.netapp.com/advisory/ntap-20220114-0004/
- https://security.netapp.com/advisory/ntap-20220114-0004/
- DSA-5027
- DSA-5027
- https://www.zerodayinitiative.com/advisories/ZDI-21-1550/
- https://www.zerodayinitiative.com/advisories/ZDI-21-1550/
Closed bugs
Segmentation fault при запуске иксов
xorg-server: редкие зависания при старте и попытке разблокировать экран
xorg-server не запускается на устройствах с GPU Mali Midgard
Closed vulnerabilities
BDU:2022-05569
Уязвимость реализации сценария ephy-about:overview веб-браузера Epiphany, позволяющая нарушителю проводить межсайтовые сценарные атаки
Modified: 2024-11-21
CVE-2021-45085
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an about: page, as demonstrated by ephy-about:overview when a user visits an XSS payload page often enough to place that page on the Most Visited list.
- https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
- https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
- https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
- https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
- [debian-lts-announce] 20220818 [SECURITY] [DLA 3074-1] epiphany-browser security update
- [debian-lts-announce] 20220818 [SECURITY] [DLA 3074-1] epiphany-browser security update
- DSA-5042
- DSA-5042
Modified: 2024-11-21
CVE-2021-45086
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js.
Modified: 2024-11-21
CVE-2021-45087
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 when View Source mode or Reader mode is used, as demonstrated by a a page title.
- https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
- https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
- https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
- https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
- [debian-lts-announce] 20220818 [SECURITY] [DLA 3074-1] epiphany-browser security update
- [debian-lts-announce] 20220818 [SECURITY] [DLA 3074-1] epiphany-browser security update
- DSA-5042
- DSA-5042
Modified: 2024-11-21
CVE-2021-45088
XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an error page.
- https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
- https://gitlab.gnome.org/GNOME/epiphany/-/issues/1612
- https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
- https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1045
- [debian-lts-announce] 20220818 [SECURITY] [DLA 3074-1] epiphany-browser security update
- [debian-lts-announce] 20220818 [SECURITY] [DLA 3074-1] epiphany-browser security update
- DSA-5042
- DSA-5042