MGASA-2019-0278

Source
https://advisories.mageia.org/MGASA-2019-0278.html
Import Source
https://advisories.mageia.org/MGASA-2019-0278.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2019-0278
Related
Published
2019-09-15T14:45:31Z
Modified
2019-09-15T13:48:33Z
Summary
Updated kconfig packages fix security vulnerability
Details

Updated kconfig packages fix security vulnerability:

Dominik Penner discovered that KConfig supported a feature to define shell command execution in .desktop files. If a user is provided with a malformed .desktop file (e.g. if it's embedded into a downloaded archive and it gets opened in a file browser) arbitrary commands could get executed (CVE-2019-14744).

This update fixes the security issue by removing the shell command feature.

References
Credits

Affected packages

Mageia:7 / kconfig

Package

Name
kconfig
Purl
pkg:rpm/mageia/kconfig?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.57.0-1.1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / kconfig

Package

Name
kconfig
Purl
pkg:rpm/mageia/kconfig?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.42.0-1.1.mga6

Ecosystem specific

{
    "section": "core"
}