CVE-2018-12559: An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. The mount target path check in mounter.cpp `mpOk()` is insufficient. A regular user can consequently mount a CIFS filesystem anywhere (e.g., outside of the /home directory tree) by passing directory traversal sequences such as a home/../usr substring. CVE-2018-12560: An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. Arbitrary unmounts can be performed by regular users via directory traversal sequences such as a home/../sys/kernel substring. CVE-2018-12561: An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. A regular user can inject additional mount options such as file_mode= by manipulating (for example) the domain parameter of the samba URL. CVE-2018-12562: An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. The wrapper script 'mount.cifs.wrapper' uses the shell to forward the arguments to the actual mount.cifs binary. The shell evaluates wildcards (such as in an injected string:/home/../tmp/* string). Gentoo Security Scout Florian Schuhmacher
Changelog for 2.3.2 address CVE-2018-12559,CVE-2018-12561 and CVE-2018-12562. References: https://github.com/CDrummond/cantata/blob/master/ChangeLog commit afc4f8315d3e96574925fb530a7004cc9e6ce3d3 @maintainer(s), Don't want to assume same applies for CVE-2018-12560, as upstream doesn't mention it. Maybe someone can review the commit and confirm? Or ping upstream to query if fix is backported.
All cantata versions in tree are built with -DENABLE_REMOTE_DEVICES=OFF which means we are unaffected by this flaw.