Submitted By: Douglas R. Reno Date: 2025-04-14 Initial Package Version: 42.1 Origin: Patch submitted to upstream by reporter Upstream Status: Pending (Issue #221 in the yelp repository) Description: Fixes a security vulnerability that allows for yelp to arbitrary exfiltrate files from a system when loading a help document. This is caused by arbitrary JavaScript execution, and a proof of concept exploit is now public that exfiltrate's a user's OpenSSH private key. The CVE number for this vulnerability is CVE-2025-3155. Upstream has been aware of this for a while and the reporter of the vulnerability provided patches, though the Yelp/yelp-xsl maintainers have not fixed it yet. A GNOME Security Team representative has recommended using the reporter's patches though as it is *not* advisable to skip patching this vulnerability. The patches in yelp-xsl and yelp add a Content Security Policy (CSP) preventing JavaScript execution through help documents. diff --git a/data/xslt/mal2html.xsl.in b/data/xslt/mal2html.xsl.in index 9e44b734..0a74da55 100644 --- a/data/xslt/mal2html.xsl.in +++ b/data/xslt/mal2html.xsl.in @@ -19,6 +19,11 @@ + + + + + diff --git a/data/xslt/man2html.xsl.in b/data/xslt/man2html.xsl.in index 676ce3eb..56bc1f5c 100644 --- a/data/xslt/man2html.xsl.in +++ b/data/xslt/man2html.xsl.in @@ -131,7 +131,7 @@ the correct styling and a single character which we measure the width of and update each sheet as required. --> -