ArchLinux: 201705-12: kauth: privilege escalation
Summary
KAuth <= 5.33.0 contains a logic flaw in which the service invoking dbus is not properly checked. This allows spoofing the identity of the caller and with some carefully crafted calls can lead to gaining root from an unprivileged account.
Resolution
Upgrade to 5.33.0-2.
# pacman -Syu "kauth>=5.33.0-2"
The problem has been fixed upstream but no release is available yet.
References
https://kde.org/info/security/advisory-20170510-1.txt https://seclists.org/oss-sec/2017/q2/240 https://invent.kde.org/frameworks/kauth/-/commit/df875f725293af53399f5146362eb158b4f9216a https://invent.kde.org/unmaintained/kdelibs/-/commit/264e97625abe2e0334f97de17f6ffb52582888ab https://security.archlinux.org/CVE-2017-8422
Workaround
None.