First published: Wed Oct 21 2020(Updated: )
An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpmcore | <4.2.0 | 4.2.0 |
KDE Partition Manager | >=4.1.0<4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27187 is an issue discovered in KDE Partition Manager 4.1.0 before 4.2.0, where the kpmcore_externalcommand helper contains a logic flaw that allows an attacker on the local machine to replace /etc/fstab and execute mount and other partitioning related commands.
CVE-2020-27187 has a severity rating of 7.8 (high).
To fix CVE-2020-27187, update KDE Partition Manager to version 4.2.0 or later.
You can find more information about CVE-2020-27187 on the Red Hat Bugzilla page and the KDE security advisory.
Yes, the patch for CVE-2020-27187 is included in KDE Partition Manager version 4.2.0.