- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3423-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
May 15, 2023                                  https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : epiphany-browser
Version        : 3.32.1.2-3~deb10u3
CVE ID         : CVE-2023-26081
Debian Bug     : 1031727

It was discovered that there was a potential credential stealing
attack in epiphany-browser, the default GNOME web browser.

When using a sandboxed Content Security Policy (CSP) or the HTML
"iframe" tag, the sandboxed web content was trusted by the
main/surrounding resource. After this change, however, the password
manager is disabled entirely in this situations, so that the
untrusted web content cannot exfiltrate passwords.

For Debian 10 buster, this problem has been fixed in version
3.32.1.2-3~deb10u3.

We recommend that you upgrade your epiphany-browser packages.

For the detailed security status of epiphany-browser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/epiphany-browser

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3423-1: epiphany-browser security update

May 15, 2023
It was discovered that there was a potential credential stealing attack in epiphany-browser, the default GNOME web browser

Summary

When using a sandboxed Content Security Policy (CSP) or the HTML
"iframe" tag, the sandboxed web content was trusted by the
main/surrounding resource. After this change, however, the password
manager is disabled entirely in this situations, so that the
untrusted web content cannot exfiltrate passwords.

For Debian 10 buster, this problem has been fixed in version
3.32.1.2-3~deb10u3.

We recommend that you upgrade your epiphany-browser packages.

For the detailed security status of epiphany-browser please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/epiphany-browser

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : epiphany-browser
Version : 3.32.1.2-3~deb10u3
CVE ID : CVE-2023-26081
Debian Bug : 1031727

Related News