An updated kde4libs package has been released for Debian
- -------------------------------------------------------------------------Kde4libs security update for Debian
Debian Security Advisory DSA-3849-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 12, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : kde4libs
CVE ID : CVE-2017-6410 CVE-2017-8422
Debian Bug : 856890
Several vulnerabilities were discovered in kde4libs, the core libraries
for all KDE 4 applications. The Common Vulnerabilities and Exposures
project identifies the following problems:
CVE-2017-6410
Itzik Kotler, Yonatan Fridburg and Amit Klein of Safebreach Labs
reported that URLs are not sanitized before passing them to
FindProxyForURL, potentially allowing a remote attacker to obtain
sensitive information via a crafted PAC file.
CVE-2017-8422
Sebastian Krahmer from SUSE discovered that the KAuth framework
contains a logic flaw in which the service invoking dbus is not
properly checked. This flaw allows spoofing the identity of the
caller and gaining root privileges from an unprivileged account.
For the stable distribution (jessie), these problems have been fixed in
version 4:4.14.2-5+deb8u2.
For the unstable distribution (sid), these problems have been fixed in
version 4:4.14.26-2.
We recommend that you upgrade your kde4libs packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/