[arch-security] [ASA-201705-12] kauth: privilege escalation

Remi Gacogne rgacogne at archlinux.org
Wed May 10 16:41:40 UTC 2017


Arch Linux Security Advisory ASA-201705-12
==========================================

Severity: High
Date    : 2017-05-10
CVE-ID  : CVE-2017-8422
Package : kauth
Type    : privilege escalation
Remote  : No
Link    : https://security.archlinux.org/AVG-269

Summary
=======

The package kauth before version 5.33.0-2 is vulnerable to privilege
escalation.

Resolution
==========

Upgrade to 5.33.0-2.

# pacman -Syu "kauth>=5.33.0-2"

The problem has been fixed upstream but no release is available yet.

Workaround
==========

None.

Description
===========

KAuth <= 5.33.0 contains a logic flaw in which the service invoking
dbus is not properly checked. This allows spoofing the identity of the
caller and with some carefully crafted calls can lead to gaining root
from an unprivileged account.

Impact
======

A local, unprivileged attacker can escalate privileges to become root
on the affected host.

References
==========

https://cgit.kde.org/kauth.git/commit/?id=df875f725293af53399f5146362eb158b4f9216a
https://www.kde.org/info/security/advisory-20170510-1.txt
http://seclists.org/oss-sec/2017/q2/240
https://commits.kde.org/kauth/df875f725293af53399f5146362eb158b4f9216a
https://commits.kde.org/kdelibs/264e97625abe2e0334f97de17f6ffb52582888ab
https://security.archlinux.org/CVE-2017-8422

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170510/719fb2fd/attachment.asc>


More information about the arch-security mailing list