drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in kconfig
Name: |
Ausführen beliebiger Kommandos in kconfig |
|
ID: |
DSA-4494-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch, Debian buster |
|
Datum: |
Sa, 10. August 2019, 07:40 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14744 |
|
Applikationen: |
KDE Frameworks |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4494-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff August 09, 2019 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : kconfig CVE ID : CVE-2019-14744
Dominik Penner discovered that KConfig, the KDE configuration settings framework, supported a feature to define shell command execution in .desktop files. If a user is provided with a malformed .desktop file (e.g. if it's embedded into a downloaded archive and it gets opened in a file browser) arbitrary commands could get executed. This update removes this feature.
For the oldstable distribution (stretch), this problem has been fixed in version 5.28.0-2+deb9u1.
For the stable distribution (buster), this problem has been fixed in version 5.54.0-1+deb10u1.
We recommend that you upgrade your kconfig packages.
For the detailed security status of kconfig please refer to its security tracker page at: https://security-tracker.debian.org/tracker/kconfig
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl1NlzoACgkQEMKTtsN8 Tjaw4Q/9FzjCBgE64hT9vdplL6QpSBBWQr1DJyiME4fd3qRjxOmPghWLrPUAu5vF 2nXGcFf7nZX6+0AjwOGO65V687Xci0KIP/YNQNmbHeThIbUfCt2CDnWDBgYowY26 oRmzfBn7Xo6IuBVCmFYb+yNh2zAoCBm7HmX5L/GaZhBB31ONUs/VKJFvH/zVdnA2 kKnS/DF2TRgQ+uLy/JMEtX1u3TCKVL71mUeeZhACFjck8jZorXEigCJiTftc8l/y 68RnA8NusDz61eKmoVq0kdhna0JgU+oJ+1zQSwSfNaUaqfdDtO6QLzW6A7rdNQH7 Feb7RIDmFq0giGZ0tLcD3U91VMLwmKIYf/ofWq5hSTt+ccR8PzFIdaCoFhfG7ji1 46TfsGpYcci8NxmJ3HI3YY5CSGRBU6GVAs2cs8n72hncBNOWLbRrW9Fdsd8XWiqc toTRG1tsrgAbXYzYzclzqueKv3UDo1qdH34oI8ozZ3Rp6+oIpPRL+74K1G6JxYQl c2YeBmX+LpLrJKrJq8YsUkjv3qLMqduVwvF4Mr2Ktf/QP/CUCw00kIRZIaLBtJy8 4dqTXVDtowC0Qyzc+Cn+iRyl1tyqFAld9gK3Q4Ie53lVZfBLJa4TS9MMvjy4PBDG j0emwOBIYpPQcjfv71XbVqQ6n3pX/RkzLfGvEMRuSbByzvWaT0A= =yWRl -----END PGP SIGNATURE-----
|
|
|
|