|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-32184: opensuse-welcome: local arbitrary code execution in XFCE environment if custom desktop layout is selected | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Matthias Gerstner <matthias.gerstner> |
| Component: | Incidents | Assignee: | Matthias Gerstner <matthias.gerstner> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | dleuenberger, filippo.bonazzi, jsegitz, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | [none] | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-32184:7.8:(AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 1213340 | ||
| Attachments: | PoC program | ||
|
Description
Matthias Gerstner
2023-07-27 09:29:51 UTC
Created attachment 868450 [details]
PoC program
Please use CVE-2023-32184 for this There are only openSUSE community maintainers for this package and even them don't seem to be much involved into the package. I will attempt a fix myself, shouldn't be too hard. Doing this privately will be difficult, I guess I will communicate openly that there is a CVE fixed by this, but not publish this bug here with the details before updates are available. I just create the GitHub PR# to address this: https://github.com/openSUSE/openSUSE-welcome/pull/32 Turns out this is even weirder than what it looked like at first. I thought the layout tarballs are actually coming from the xfce4-panel-profiles package, installed in /usr/share/xfce4-panel-profiles/layouts. Instead a couple of layout tarballs are embedded into opensuse-welcome as "application resources". This is probably also the reason why this stunt with the /tmp/layout fixed path was introduced in the first place. It was used as a vehicle to write the embedded tarballs to disk. The Qt libraries transparently handle special paths starting with a colon as application resource paths. In my PR# I am now using a QTemporaryFile to write out the application resource. The embedded Python script is now an external file that needs to be packaged. This should make things clearer and more importantly fix the security issue. submitted in https://build.opensuse.org/request/show/1103483, removing embargoed tag, but I'll leave the bug private for now This is an autogenerated message for OBS integration: This bug (1213708) was mentioned in https://build.opensuse.org/request/show/1103493 Factory / opensuse-welcome https://build.opensuse.org/request/show/1103495 Backports:SLE-15-SP5 / opensuse-welcome This is an autogenerated message for OBS integration: This bug (1213708) was mentioned in https://build.opensuse.org/request/show/1103813 Backports:SLE-15-SP5 / opensuse-welcome https://build.opensuse.org/request/show/1103814 Backports:SLE-15-SP4 / opensuse-welcome openSUSE-SU-2023:0219-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1213708 CVE References: CVE-2023-32184 JIRA References: Sources used: openSUSE Backports SLE-15-SP5 (src): opensuse-welcome-0.1.9+git.35.4b9444a-bp155.2.3.1 openSUSE-SU-2023:0230-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1213708 CVE References: CVE-2023-32184 JIRA References: Sources used: openSUSE Backports SLE-15-SP4 (src): opensuse-welcome-0.1.9+git.0.66be0d8-bp154.2.6.1 Updates are now in place for all maintained openSUSE codestream. Publishing and closing this bug. |