Source: konsole
Version: 4:25.04.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: close -1 4:25.04.0-2
Control: found -1 4:22.12.3-1

Hi,

The following vulnerability was published for konsole.

CVE-2025-49091[0]:
| KDE Konsole before 25.04.2 allows remote code execution in a certain
| scenario. It supports loading URLs from the scheme handlers such as
| a ssh:// or telnet:// or rlogin:// URL. This can be executed
| regardless of whether the ssh, telnet, or rlogin binary is
| available. In this mode, there is a code path where if that binary
| is not available, Konsole falls back to using /bin/bash for the
| given arguments (i.e., the URL) provided. This allows an attacker to
| execute arbitrary code.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-49091
    https://www.cve.org/CVERecord?id=CVE-2025-49091
[1] https://www.openwall.com/lists/oss-security/2025/06/10/5
[2] https://kde.org/info/security/advisory-20250609-1.txt
[3] 
https://invent.kde.org/utilities/konsole/-/commit/09d20dea109050b4c02fb73095f327b5642a2b75

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to