Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 953900 - gnome-extra/yelp - Dangerous Arbitrary File Read Vulnerability (CVE-2025-3155)
Summary: gnome-extra/yelp - Dangerous Arbitrary File Read Vulnerability (CVE-2025-3155)
Status: CONFIRMED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard: B2 [upstream/ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2025-04-16 01:44 UTC by Leung Ki Chi
Modified: 2025-04-16 06:50 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Leung Ki Chi 2025-04-16 01:44:54 UTC
Hi security team,

As per the below links, Yelp has serious file read vulnerability.
Upstream yet to patch although reporter proposed patches.

https://www.phoronix.com/news/GNOME-Yelp-Security-Issue-2025
https://blogs.gnome.org/mcatanzaro/2025/04/15/dangerous-arbitrary-file-read-vulnerability-in-yelp-cve-2025-3155/
Comment 1 Leung Ki Chi 2025-04-16 01:50:00 UTC
Upstream report: https://gitlab.gnome.org/GNOME/yelp/-/issues/221

"Since Yelp accepts absolute paths in ghelp URLs, If an attacker can put index.page in any directory on User's filesystem, They can trigger Yelp to show the page if Victim opens a malicious ghelp URL."

https://gist.github.com/parrot409/e970b155358d45b298d7024edd9b17f2

"The innovation there is to use /proc/self/cwd to bypass the limitation that the attacker must be able to guess the user's home directory name"