oss-sec mailing list archives

CVE request: pyxtrlock


From: Leon Weber <leon () leonweber de>
Date: Wed, 25 Sep 2013 21:28:46 +0200

Hi,

two security issues were found and fixed in pyxtrlock[1], a lightweight X
screen locker.

• A mis-spelled variable name could cause the program to crash and thus
  unlock the screen without requiring a password if the erroneous code
  line was reached, which could be achieved by correctly timing multiple
  authentication failures.

  This was found by Paul Lhussiez and reported to us at

      <https://github.com/leonnnn/pyxtrlock/issues/8>

  Commit containing the fix, and security release announcement:

      <https://github.com/leonnnn/pyxtrlock/commit/297a697ce1543451166a9c85ba1e0dd76fa4ae10>
      <https://zombofant.net/blog/2013/8/pyxtrlock-release-0.1-130825>

  All versions before release 0.1 or git commit 297a697 are vulnerable.

• Incorrect return value checking after calling XCB library functions
  led to the program seemingly starting up normally, but leaving the
  keyboard or mouse not actually locked in case the xcb_grab_*()
  functions returned an error. There would be no indication for the user
  that one of the input devices is not locked.

  Commit containing the fix, and security release announcement:

      <https://github.com/leonnnn/pyxtrlock/commit/50a8522392809a5688638d074fb9f84264c8b58d>
      <https://zombofant.net/blog/2013/9/pyxtrlock-release-0.2-130909>

  All versions before release 0.2 or git commit 50a8522 are vulnerable.

Could CVE-IDs be assigned for these, please?

    -- Leon.        (pyxtrlock maintainer)

[1]: <https://zombofant.net/hacking/pyxtrlock>

Attachment: signature.asc
Description: Digital signature


Current thread: