Updated gtk+3.0 packages fix security vulnerability :
Clemens Fries reported that, when using Cinnamon, it was possible to bypass the screensaver lock. An attacker with physical access to the machine could use this flaw to take over the locked desktop session (CVE-2014-1949).
This was fixed by including a patch for the root cause of the issue in gtk+3.0, which came from the implementation of popup menus in GtkWindow (bgo#722106).
This update also includes other patches from upstream to fix bugs affecting GtkFileChooser (bgo#386569, bgo#719977) and GtkSpinButton (bgo#709491), and a crash related to clipboard handling (bgo#719314).
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandriva Linux Security Advisory MDVSA-2015:162.
# The text itself is copyright (C) Mandriva S.A.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(82415);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2014-1949");
script_xref(name:"MDVSA", value:"2015:162");
script_name(english:"Mandriva Linux Security Advisory : gtk+3.0 (MDVSA-2015:162)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Mandriva Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"Updated gtk+3.0 packages fix security vulnerability :
Clemens Fries reported that, when using Cinnamon, it was possible to
bypass the screensaver lock. An attacker with physical access to the
machine could use this flaw to take over the locked desktop session
(CVE-2014-1949).
This was fixed by including a patch for the root cause of the issue in
gtk+3.0, which came from the implementation of popup menus in
GtkWindow (bgo#722106).
This update also includes other patches from upstream to fix bugs
affecting GtkFileChooser (bgo#386569, bgo#719977) and GtkSpinButton
(bgo#709491), and a crash related to clipboard handling (bgo#719314)."
);
script_set_attribute(
attribute:"see_also",
value:"http://advisories.mageia.org/MGASA-2014-0374.html"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:gtk+3.0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64gail3.0-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64gail3_0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64gtk+3.0-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64gtk+3_0");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64gtk-gir3.0");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:2");
script_set_attribute(attribute:"patch_publication_date", value:"2015/03/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/30");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"gtk+3.0-3.10.6-5.1.mbs2")) flag++;
if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64gail3.0-devel-3.10.6-5.1.mbs2")) flag++;
if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64gail3_0-3.10.6-5.1.mbs2")) flag++;
if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64gtk+3.0-devel-3.10.6-5.1.mbs2")) flag++;
if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64gtk+3_0-3.10.6-5.1.mbs2")) flag++;
if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64gtk-gir3.0-3.10.6-5.1.mbs2")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
mandriva | linux | gtk%2b3.0 | p-cpe:/a:mandriva:linux:gtk%2b3.0 |
mandriva | linux | lib64gail3.0-devel | p-cpe:/a:mandriva:linux:lib64gail3.0-devel |
mandriva | linux | lib64gail3_0 | p-cpe:/a:mandriva:linux:lib64gail3_0 |
mandriva | linux | lib64gtk%2b3.0-devel | p-cpe:/a:mandriva:linux:lib64gtk%2b3.0-devel |
mandriva | linux | lib64gtk%2b3_0 | p-cpe:/a:mandriva:linux:lib64gtk%2b3_0 |
mandriva | linux | lib64gtk-gir3.0 | p-cpe:/a:mandriva:linux:lib64gtk-gir3.0 |
mandriva | business_server | 2 | cpe:/o:mandriva:business_server:2 |