svn commit: r469031 - head/security/vuxml

Adriaan de Groot adridg at FreeBSD.org
Fri May 4 14:28:59 UTC 2018


Author: adridg
Date: Fri May  4 14:28:58 2018
New Revision: 469031
URL: https://svnweb.freebsd.org/changeset/ports/469031

Log:
  Security notice regarding kwallet-pam (KDE Plasma5).
  
    https://www.kde.org/info/security/advisory-20180503-1.txt
  
  The port is not built by default through the regular KDE packages,
  and has been in the ports tree only a week; the impact is expected
  to be low.
  
  Approved by:	tcberner (mentor, implicit)

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri May  4 14:15:01 2018	(r469030)
+++ head/security/vuxml/vuln.xml	Fri May  4 14:28:58 2018	(r469031)
@@ -58,6 +58,36 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="83a548b5-4fa5-11e8-9a8e-001e2a3f778d">
+    <topic>KWallet-PAM -- Access to privileged files</topic>
+    <affects>
+      <package>
+	<name>plasma5-kwallet-pam</name>
+	<range><lt>5.12.5_1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The KDE Community reports:</p>
+	<blockquote cite="https://www.kde.org/info/security/advisory-20180503-1.txt">
+	  <p>
+	  kwallet-pam was doing file writing and permission changing
+	  as root that with correct timing and use of carefully
+	  crafted symbolic links could allow a non privileged user
+	  to become the owner of any file on the system.
+	  </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://www.kde.org/info/security/advisory-20180503-1.txt</url>
+    </references>
+    <dates>
+      <discovery>2018-05-04</discovery>
+      <entry>2018-05-04</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="89ca6f7d-4f00-11e8-9b1d-00e04c1ea73d">
     <topic>drupal -- Drupal Core - Multiple Vulnerabilities</topic>
     <affects>


More information about the svn-ports-head mailing list