CVE-2024-36472

NameCVE-2024-36472
DescriptionIn GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript code's behavior.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1072124

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnome-shell (PTS)jessie3.14.4-1~deb8u1vulnerable
stretch (security), stretch (lts), stretch3.22.3-3+deb9u1vulnerable
buster3.30.2-11~deb10u2vulnerable
bullseye (security), bullseye3.38.6-1~deb11u2vulnerable
bookworm (security), bookworm43.9-0+deb12u2vulnerable
sid, trixie47.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnome-shellsourcejessie(unfixed)end-of-life
gnome-shellsource(unstable)47.0-31072124

Notes

[bookworm] - gnome-shell <no-dsa> (Minor issue)
[bullseye] - gnome-shell <no-dsa> (Minor issue)
[buster] - gnome-shell <postponed> (Minor issue)
https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/7688
https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/3307
https://gitlab.gnome.org/GNOME/gnome-shell/-/merge_requests/3408
https://gitlab.gnome.org/GNOME/gnome-shell/-/commit/5aa89fa9e62d20c99afd2eff13901faef96244ad (47.alpha)
https://gitlab.gnome.org/GNOME/gnome-shell/-/commit/57de9ee874bff07b71dc323e54d5d721c4ded7fe (47.beta)
https://gitlab.gnome.org/GNOME/gnome-shell/-/commit/4ab1ccf3f21b754ce4be77becf5df46084a893d8 (47.beta)
https://gitlab.gnome.org/GNOME/gnome-shell/-/commit/14037478633c15a38a63d46af5f7d28bc00fd376 (47.beta)
As hardening related to CVE-2024-36472, version gnome-shell/47~rc-3 disabled
the portal helper popup window and uses the notification/browser method.

Search for package or bug name: Reporting problems