Arch Linux Security Advisory ASA-201705-13
=========================================
Severity: High
Date    : 2017-05-10
CVE-ID  : CVE-2017-8422
Package : kdelibs
Type    : privilege escalation
Remote  : No
Link    : https://security.archlinux.org/AVG-270

Summary
======
The package kdelibs before version 4.14.32-1 is vulnerable to privilege
escalation.

Resolution
=========
Upgrade to 4.14.32-1.

# pacman -Syu "kdelibs>=4.14.32-1"

The problem has been fixed upstream in version 4.14.32.

Workaround
=========
None.

Description
==========
KAuth <= 5.33.0 contains a logic flaw in which the service invoking
dbus is not properly checked. This allows spoofing the identity of the
caller and with some carefully crafted calls can lead to gaining root
from an unprivileged account.

Impact
=====
A local, unprivileged attacker can escalate privileges to become root
on the affected host.

References
=========
https://invent.kde.org/unmaintained/kdelibs/-/commit/264e97625abe2e0334f97de17f6ffb52582888ab
https://kde.org/info/security/advisory-20170510-1.txt
https://seclists.org/oss-sec/2017/q2/240
https://invent.kde.org/frameworks/kauth/-/commit/df875f725293af53399f5146362eb158b4f9216a
https://security.archlinux.org/CVE-2017-8422

ArchLinux: 201705-13: kdelibs: privilege escalation

May 10, 2017

Summary

KAuth <= 5.33.0 contains a logic flaw in which the service invoking dbus is not properly checked. This allows spoofing the identity of the caller and with some carefully crafted calls can lead to gaining root from an unprivileged account.

Resolution

Upgrade to 4.14.32-1. # pacman -Syu "kdelibs>=4.14.32-1"
The problem has been fixed upstream in version 4.14.32.

References

https://invent.kde.org/unmaintained/kdelibs/-/commit/264e97625abe2e0334f97de17f6ffb52582888ab https://kde.org/info/security/advisory-20170510-1.txt https://seclists.org/oss-sec/2017/q2/240 https://invent.kde.org/frameworks/kauth/-/commit/df875f725293af53399f5146362eb158b4f9216a https://security.archlinux.org/CVE-2017-8422

Severity
Package : kdelibs
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-270

Workaround

None.

Related News