[CVE] malicious .desktop files (and others) would execute code
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
kconfig (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Xenial |
Fix Released
|
Medium
|
Unassigned | ||
Bionic |
Fix Released
|
Medium
|
Unassigned | ||
Disco |
Fix Released
|
Medium
|
Unassigned | ||
kde4libs (Ubuntu) |
Fix Released
|
Low
|
Unassigned | ||
Xenial |
Fix Released
|
Low
|
Unassigned | ||
Bionic |
Fix Released
|
Low
|
Unassigned | ||
Disco |
Fix Released
|
Low
|
Unassigned |
Bug Description
KDE Project Security Advisory
=======
Title: kconfig: malicious .desktop files (and others) would execute code
Risk Rating: High
CVE: CVE-2019-14744
Versions: KDE Frameworks < 5.61.0
Date: 7 August 2019
Overview
========
The syntax Key[$e]=$(shell command) in *.desktop files, .directory files, and configuration files
(typically found in ~/.config) was an intentional feature of KConfig, to allow flexible configuration.
This could however be abused by malicious people to make the users install such files and get code
executed even without intentional action by the user. A file manager trying to find out the icon for
a file or directory could end up executing code, or any application using KConfig could end up
executing malicious code during its startup phase for instance.
After careful consideration, the entire feature of supporting shell commands in KConfig entries has been removed,
because we couldn't find an actual use case for it. If you do have an existing use for the feature, please
contact us so that we can evaluate whether it would be possible to provide a secure solution.
Note that [$e] remains useful for environment variable expansion.
Solution
========
KDE Frameworks 5 users:
- update to kconfig >= 5.61.0
- or apply the following patch to kconfig:
https:/
kdelibs users: apply the following patch to kdelibs 4.14:
https:/
Credits
=======
Thanks to Dominik Penner for finding and documenting this issue (we wish however that he would
have contacted us before making the issue public) and to David Faure for the fix.
CVE References
tags: | added: patch |
Changed in kconfig (Ubuntu): | |
importance: | Undecided → Medium |
Changed in kconfig (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in kconfig (Ubuntu Bionic): | |
importance: | Undecided → Medium |
Changed in kconfig (Ubuntu Disco): | |
importance: | Undecided → Medium |
Changed in kde4libs (Ubuntu): | |
importance: | Undecided → Low |
Changed in kde4libs (Ubuntu Xenial): | |
importance: | Undecided → Low |
Changed in kde4libs (Ubuntu Bionic): | |
importance: | Undecided → Low |
Changed in kde4libs (Ubuntu Disco): | |
importance: | Undecided → Low |
information type: | Public → Public Security |
Debdiff with fix for Disco archive