Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 27 Apr 2017 10:04:06 +0200
From: Emilio Pozuelo Monfort <pochu@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2017-8288: gnome-shell may leave extensions enabled in the lock
 screen

Hi,

The following CVE was assigned to gnome-shell. Note this may affect earlier
versions than 3.22, but I didn't check them.

[Suggested description]
gnome-shell 3.22 through 3.24.1 mishandles extensions that fail to reload,
which can lead to leaving extensions enabled in the lock screen.
With these extensions, a bystander could
launch applications (but not interact with them), see information from
the extensions (e.g., what applications you have opened or what music
you were playing), or even execute arbitrary commands. It all
depends on what extensions a user has enabled. The problem is caused by lack of
exception handling in
js/ui/extensionSystem.js.

------------------------------------------

[Vulnerability Type]
Incorrect Access Control

------------------------------------------

[VulnerabilityType Other]
Incorrect Access Control

------------------------------------------

[Vendor of Product]
GNOME

------------------------------------------

[Affected Product Code Base]
gnome-shell - 3.22 - 3.25

------------------------------------------

[Affected Component]
js/ui/extensionSystem.js

------------------------------------------

[Attack Type]
Physical

------------------------------------------

[Impact Code execution]
true

------------------------------------------

[Impact Information Disclosure]
true

------------------------------------------

[Attack Vectors]
A broken gnome-shell extension needs to be installed (broken as in may
work normally, but has a bug where it fails to reload properly)

An extension reload needs to be triggered (which can happen for multiple reasons)

------------------------------------------

[Reference]
https://bugzilla.gnome.org/show_bug.cgi?id=781728
https://github.com/EasyScreenCast/EasyScreenCast/issues/46
https://bugs.kali.org/view.php?id=2513
https://github.com/GNOME/gnome-shell/commit/ff425d1db7082e2755d2a405af53861552acf2a1

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ