Bug 1740138 (CVE-2019-14744)
Summary: | CVE-2019-14744 kdelibs: malicious desktop files and configuration files lead to code execution with minimal user interaction | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | jgrulich, jreznik, kde-sig, kevin, me, msiddiqu, rdieter, smparrish, than |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the KDE Frameworks KConfig prior to version 5.61.0. Certain syntax commands were allowed in .desktop, .directory, and configuration files to allow flexible configurations with the desktop environment. An attacker could add malicious code to a file that a user would unintentionally install, thus executing the malicious code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-09-04 13:07:37 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1740141, 1740140, 1740736, 1740737, 1826816, 1826817, 1826818 | ||
Bug Blocks: | 1740142 |
Description
Marian Rehak
2019-08-12 11:04:21 UTC
Created kdelibs tracking bugs for this issue: Affects: fedora-all [bug 1740140] Created kdelibs3 tracking bugs for this issue: Affects: epel-7 [bug 1740141] If you create a kdelibs3 fedora-all tracker, I'll add it to the updates already in Bodhi: https://bodhi.fedoraproject.org/updates/FEDORA-2019-f9f78895c3 (Fedora 30) https://bodhi.fedoraproject.org/updates/FEDORA-2019-9f2ee52c88 (Fedora 29) (I already added this metatracker there.) Patch kconfig KDE5: https://cgit.kde.org/kconfig.git/commit/?id=5d3e71b1d2ecd2cb2f910036e614ffdfc895aa22 Patch kdelibs KDE4: https://cgit.kde.org/kdelibs.git/commit/?id=2c3762feddf7e66cf6b64d9058f625a715694a00 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-14744 Statement: This issue affects the versions of kdelibs as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Enterprise Linux 5 is now in Extended Life Phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Important, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. kde-settings-30.3-1.fc30, kdelibs-4.14.38-15.fc30 has been pushed to the Fedora 30 stable repository. If problems still persist, please make note of it in this bug report. kdelibs3-3.5.10-101.fc30 has been pushed to the Fedora 30 stable repository. If problems still persist, please make note of it in this bug report. kdelibs3-3.5.10-101.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report. kde-settings-29.1-1.fc29, kdelibs-4.14.38-15.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2606 https://access.redhat.com/errata/RHSA-2019:2606 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-14744 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:2833 https://access.redhat.com/errata/RHSA-2020:2833 |