1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - -------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200212-9 |
6 |
- - -------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE : kde-3.0.x |
9 |
SUMMARY : multiple vulnerabilities in KDE |
10 |
DATE : 2002-12-22 13:12 UTC |
11 |
EXPLOIT : remote |
12 |
|
13 |
- - -------------------------------------------------------------------- |
14 |
|
15 |
- From advisory: |
16 |
|
17 |
"In some instances KDE fails to properly quote parameters of |
18 |
instructions passed to a command shell for execution. |
19 |
|
20 |
These parameters may incorporate data such as URLs, filenames and |
21 |
e-mail addresses, and this data may be provided remotely to a victim |
22 |
in an e-mail, a webpage or files on a network filesystem or other |
23 |
untrusted source. |
24 |
|
25 |
By carefully crafting such data an attacker might be able to |
26 |
execute arbitary commands on a vulnerable sytem using the victim's |
27 |
account and privileges. |
28 |
|
29 |
The KDE Project is aware of several possible exploits of these |
30 |
vulnerabilities and is releasing this advisory with patches to |
31 |
correct the issues. The patches also provide better safe guards and |
32 |
check data from untrusted sources more strictly in multiple places." |
33 |
|
34 |
Read the full advisory at |
35 |
http://www.kde.org/info/security/advisory-20021220-1.txt |
36 |
|
37 |
INFORMATION REGARDING OTHER ARCHITECTURES THAN X86 |
38 |
|
39 |
kde-3.0.5a is currenlty only marked stable for x86. If you have |
40 |
succesfully compiled and merged 3.0.5a on any other architecture |
41 |
than x86 please report this to kde@g.o. |
42 |
|
43 |
INFORMATION REGARDING KDE 2.2.2 AND KDE 3.1 |
44 |
|
45 |
The Gentoo KDE team is currently testing a new revision of KDE 2.2.2 |
46 |
that includes fixes for the vulnerabilities mentioned in KDEs security |
47 |
advisory. A new GLSA will be issued when those packages are available. |
48 |
|
49 |
KDE 3.1 has not yet been released by KDE. However, masked ebuilds exist |
50 |
in the portage tree for various release canidates. Since KDE has not |
51 |
released a new version that fixes these vulnerabilites no update is |
52 |
available for those who are currently running any version of the 3.1.x |
53 |
series. If KDE releases a new RC before the official release and when |
54 |
KDE 3.1 final is released a new GLSA will be issued to adress the |
55 |
vulnerabilites in the 3.1.x series. |
56 |
|
57 |
SOLUTION |
58 |
|
59 |
It is recommended that all Gentoo Linux users who are running |
60 |
kde-base/kde-3.0.4 and earlier in the 3.0.x series update their |
61 |
systems as follows: |
62 |
|
63 |
emerge rsync |
64 |
emerge kde |
65 |
emerge clean |
66 |
|
67 |
- - -------------------------------------------------------------------- |
68 |
aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz |
69 |
kde@g.o |
70 |
- - -------------------------------------------------------------------- |
71 |
-----BEGIN PGP SIGNATURE----- |
72 |
Version: GnuPG v1.2.1 (GNU/Linux) |
73 |
|
74 |
iD8DBQE+BcDAfT7nyhUpoZMRAgOVAJ9+6q+PanprNTsrcsXOIyNYxKC5SgCgu0uf |
75 |
5DJ+2iGbIo/UfiY45AKXEvY= |
76 |
=3ZMj |
77 |
-----END PGP SIGNATURE----- |