OS Command Injection Affecting plasma-workspace package, versions <4:5.12.0-2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-PLASMAWORKSPACE-526939
- published 7 Feb 2018
- disclosed 7 Feb 2018
How to fix?
Upgrade Debian:11
plasma-workspace
to version 4:5.12.0-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream plasma-workspace
package and not the plasma-workspace
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
An issue was discovered in soliduiserver/deviceserviceaction.cpp in KDE Plasma Workspace before 5.12.0. When a vfat thumbdrive that contains `` or $() in its volume label is plugged in and mounted through the device notifier, it's interpreted as a shell command, leading to a possibility of arbitrary command execution. An example of an offending volume label is "$(touch b)" -- this will create a file called b in the home folder.
References
- https://security-tracker.debian.org/tracker/CVE-2018-6791
- https://bugs.kde.org/show_bug.cgi?id=389815
- https://cgit.kde.org/plasma-workspace.git/commit/?id=9db872df82c258315c6ebad800af59e81ffb9212
- https://www.debian.org/security/2018/dsa-4116
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2018-6791