![]() |
|
Message-ID: <c549b82a-ddd8-4ff0-ae8b-3fed9896f656@oracle.com> Date: Fri, 4 Apr 2025 12:07:21 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: CVE-2025-3155 GNOME Yelp: Arbitrary file read by abusing ghelp scheme GNOME has issued CVE-2025-3155 for the following bug in Yelp, the help file viewer in the GNOME Desktop (unrelated to the similarly named app for restaurant reviews): https://gitlab.gnome.org/GNOME/yelp/-/issues/221 The description they landed on after analysis was: Yelp, the GNOME user help application, allows help documents to execute arbitrary JavaScript. A malicious help document may exfiltrate user files to a remote server. A malicious website may download a help document without user intervention, then trick the user into opening a ghelp URL that references the help document. This notably requires the attacker to guess the filesystem path of the downloaded help document. While there are proposed patches in the bug report, none seem to have been committed to the git repo yet. -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.