CVE-2014-5033
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
19/08/2014
Last modified:
12/04/2025
Description
KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:debian:kde4libs:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:a:kde:kauth:*:*:*:*:*:*:*:* | 5.0 (including) | |
| cpe:2.3:a:kde:kdelibs:*:*:*:*:*:*:*:* | 4.13.97 (including) | |
| cpe:2.3:a:kde:kdelibs:4.10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.10.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.10.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.10.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.10.95:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.10.97:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.11.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:kde:kdelibs:4.11.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html
- http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a
- http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23
- http://rhn.redhat.com/errata/RHSA-2014-1359.html
- http://secunia.com/advisories/60385
- http://secunia.com/advisories/60633
- http://secunia.com/advisories/60654
- http://www.debian.org/security/2014/dsa-3004
- http://www.kde.org/info/security/advisory-20140730-1.txt
- http://www.ubuntu.com/usn/USN-2304-1
- http://lists.opensuse.org/opensuse-updates/2014-08/msg00012.html
- http://quickgit.kde.org/?p=kauth.git&a=commit&h=341b7d84b6d9c03cf56905cb277b47e11c81482a
- http://quickgit.kde.org/?p=kdelibs.git&a=commitdiff&h=e4e7b53b71e2659adaf52691d4accc3594203b23
- http://rhn.redhat.com/errata/RHSA-2014-1359.html
- http://secunia.com/advisories/60385
- http://secunia.com/advisories/60633
- http://secunia.com/advisories/60654
- http://www.debian.org/security/2014/dsa-3004
- http://www.kde.org/info/security/advisory-20140730-1.txt
- http://www.ubuntu.com/usn/USN-2304-1



