First published: Wed Apr 20 2022(Updated: )
In GNOME Epiphany before 41.4 and 42.x before 42.2, an HTML document can trigger a client buffer overflow (in ephy_string_shorten in the UI process) via a long page title. The issue occurs because the number of bytes for a UTF-8 ellipsis character is not properly considered.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/epiphany-browser | <=3.38.2-1<=3.32.1.2-3<=42.1-1 | |
debian/epiphany-browser | <=3.32.1.2-3~deb10u1 | 3.32.1.2-3~deb10u3 3.38.2-1+deb11u3 43.1-1 45.0-1 |
GNOME Epiphany | <41.4 | |
GNOME Epiphany | >=42.0<42.2 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29536 is a vulnerability in GNOME Epiphany that allows an HTML document to trigger a client buffer overflow via a long page title.
CVE-2022-29536 has a severity rating of 7.5 (high).
CVE-2022-29536 affects Epiphany versions before 41.4 and 42.x before 42.2.
CVE-2022-29536 allows an attacker to trigger a client buffer overflow, potentially leading to remote code execution.
To mitigate CVE-2022-29536, it is recommended to update Epiphany to version 41.4 or 42.2 or later.