Gentoo Linux Security Advisory 201706-29 - A vulnerability in KAuth and KDELibs allows local users to gain root privileges. Versions less than 5.29.0-r1 are affected.
a6514831f6193a3f2e7d37397a2b49bbba61c57093e95e6c2e2f5f26c55d9602
KDE versions 4 and 5 suffer from a KAuth privilege escalation vulnerability.
c554a74a267c52aca3ad742178547b8d2a015c7f0cd8cbcdba5e0a178a1d4c91
Red Hat Security Advisory 2017-1264-01 - The K Desktop Environment is a graphical desktop environment for the X Window System. The kdelibs packages include core libraries for the K Desktop Environment. Security Fix: A privilege escalation flaw was found in the way kdelibs handled D-Bus messages. A local user could potentially use this flaw to gain root privileges by spoofing a callerID and leveraging a privileged helper application.
55b5ec56d5fdf924706e71ec4e094f503df4e61144152b03ddfde919983c2a85
Slackware Security Advisory - New kdelibs packages are available for Slackware 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.
e3d0280e7fe50b6079f3099a89014076b13b7fc7c1d0fb595e3667c25d2a70d6
Ubuntu Security Notice 3286-1 - Sebastian Krahmer discovered that the KDE-Libs Kauth component incorrectly checked services invoking D-Bus. A local attacker could use this issue to gain root privileges.
03634ccbfa798acc61ee8d677328fe1fb99e3ebe3ef1b6c3b445f79614923931