Gentoo: GLSA-201512-12: KDE Systemsettings: Privilege escalation
Summary
KDE Systemsettings fails to properly validate user input before passing it as argument in context of higher privilege.
Resolution
All KDE Systemsettings users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=kde-base/systemsettings-4.11.13-r1"
References
[ 1 ] CVE-2014-8651 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8651
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201512-12
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Synopsis
Data validation in KDE Systemsettings could lead to local privilege escalation.
Background
KDE workspace configuration module for setting the date and time has a helper program which runs as root for performing actions.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 kde-base/systemsettings < 4.11.13-r1 >= 4.11.13-r1
Impact
===== A local attacker could gain privileges via a crafted ntpUtility (ntp utility name) argument.
Workaround
Add a polkit rule to disable the org.kde.kcontrol.kcmclock.save action.