vulnerability
SUSE: CVE-2019-7443: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Feb 9, 2019 | Feb 27, 2019 | Feb 4, 2022 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Feb 9, 2019
Added
Feb 27, 2019
Modified
Feb 4, 2022
Description
KDE KAuth before 5.55 allows the passing of parameters with arbitrary types to helpers running as root over DBus via DBusHelperProxy.cpp. Certain types can cause crashes, and trigger the decoding of arbitrary images with dynamically loaded plugins. In other words, KAuth unintentionally causes this plugin code to run as root, which increases the severity of any possible exploitation of a plugin vulnerability.
Solutions
suse-upgrade-extra-cmake-modulessuse-upgrade-kauth-develsuse-upgrade-kauth-devel-32bitsuse-upgrade-kauth-devel-64bitsuse-upgrade-kcoreaddonssuse-upgrade-kcoreaddons-develsuse-upgrade-kcoreaddons-devel-64bitsuse-upgrade-kcoreaddons-langsuse-upgrade-libkf5auth5suse-upgrade-libkf5auth5-32bitsuse-upgrade-libkf5auth5-64bitsuse-upgrade-libkf5auth5-langsuse-upgrade-libkf5coreaddons5suse-upgrade-libkf5coreaddons5-64bitsuse-upgrade-libpolkit-qt5-1-1suse-upgrade-libpolkit-qt5-1-1-64bitsuse-upgrade-libpolkit-qt5-1-develsuse-upgrade-libpolkit-qt5-1-devel-64bit
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.