vulnerability

SUSE: CVE-2019-7443: SUSE Linux Security Advisory

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Feb 9, 2019
Added
Feb 27, 2019
Modified
Feb 4, 2022

Description

KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.

Solutions

suse-upgrade-extra-cmake-modulessuse-upgrade-kauth-develsuse-upgrade-kauth-devel-32bitsuse-upgrade-kauth-devel-64bitsuse-upgrade-kcoreaddonssuse-upgrade-kcoreaddons-develsuse-upgrade-kcoreaddons-devel-64bitsuse-upgrade-kcoreaddons-langsuse-upgrade-libkf5auth5suse-upgrade-libkf5auth5-32bitsuse-upgrade-libkf5auth5-64bitsuse-upgrade-libkf5auth5-langsuse-upgrade-libkf5coreaddons5suse-upgrade-libkf5coreaddons5-64bitsuse-upgrade-libpolkit-qt5-1-1suse-upgrade-libpolkit-qt5-1-1-64bitsuse-upgrade-libpolkit-qt5-1-develsuse-upgrade-libpolkit-qt5-1-devel-64bit
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.