Debian 10262 Published by

An epiphany-browser security update has been released for Debian GNU/Linux 10 LTS to address a potential credential-stealing attack.



DLA 3423-1: epiphany-browser security update



- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3423-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/ Chris Lamb
May 15, 2023   https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : epiphany-browser
Version : 3.32.1.2-3~deb10u3
CVE ID : CVE-2023-26081
Debian Bug : 1031727

It was discovered that there was a potential credential stealing
attack in epiphany-browser, the default GNOME web browser.

When using a sandboxed Content Security Policy (CSP) or the HTML
"iframe" tag, the sandboxed web content was trusted by the
main/surrounding resource. After this change, however, the password
manager is disabled entirely in this situations, so that the
untrusted web content cannot exfiltrate passwords.

For Debian 10 buster, this problem has been fixed in version
3.32.1.2-3~deb10u3.

We recommend that you upgrade your epiphany-browser packages.

For the detailed security status of epiphany-browser please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/epiphany-browser

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS