Public bug reported:

It has now been almost a month with no reaction to KDE security
advisory. Almost all other distros fixed this some time ago...


KDE Project Security Advisory
=============================

Title:           KDE Partition Manager: kpmcore_externalcommand helper can be 
exploited in local privilege escalation
Risk Rating:     Important
CVE:             CVE-2020-27187
Versions:        kpmcore == 4.1.0
Author:          Andrius Štikonas <andr...@stikonas.eu>
Date:            17 October 2020

Overview
========

kpmcore_externalcommand helper contains a logic flaw in which the service 
invoking dbus
is not properly checked. An attacker on your local machine can replace 
/etc/fstab,
execute mount and other partitioning related commands while KDE Partition 
Manager is running.
mount command can then be used to gain full root privileges.

Impact
======

KDE Partition Manager 4.1.0 should not be used on systems with untrusted
users or running untrusted software.

Solution
========

KDE Partition Manager 4.2.0 fixes this issue.

You can apply the following patches on top of KPMcore 4.1.0:
https://invent.kde.org/system/kpmcore/-/commit/c466c5db11b5cee546d1ec0594c2f1105a354fed
 (fix)
https://invent.kde.org/system/kpmcore/-/commit/7ec4b611dcf822439b081613cca4184689266454
 (removes KF5 5.73 dependency)

** Affects: kpmcore (Ubuntu)
     Importance: Undecided
         Status: New

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27187

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1903774

Title:
  kpmcore 4.1.0: CVE-2020-27187

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kpmcore/+bug/1903774/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to