- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201706-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: KAuth and KDELibs: Privilege escalation Date: June 27, 2017 Bugs: #618108 ID: 201706-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in KAuth and KDELibs allows local users to gain root privileges. Background ========== KAuth provides a convenient, system-integrated way to offload actions that need to be performed as a privileged user (root, for example) to small (hopefully secure) helper utilities. The KDE libraries, basis of KDE and used by many open source projects. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 kde-frameworks/kauth < 5.29.0-r1 >= 5.29.0-r1 2 kde-frameworks/kdelibs < 4.14.32 >= 4.14.32 ------------------------------------------------------------------- 2 affected packages Description =========== KAuth and KDELibs contains a logic flaw in which the service invoking D-Bus is not properly checked. This allows spoofing the identity of the caller and with some carefully crafted calls can lead to gaining root from an unprivileged account. Impact ====== A local attacker could spoof the identity of the caller invoking D-Bus, possibly resulting in gaining privileges. Workaround ========== There is no known workaround at this time. Resolution ========== All KAuth users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=kde-frameworks/kauth-5.29.0-r1"= All KDELibs users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=kde-frameworks/kdelibs-4.14.32"= References ========== [ 1 ] CVE-2017-8422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8422 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201706-29 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --voP1sO4JWVQTvFRqAK0gNlgin5VF2eJFd--