Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: kde-3.0.x
Date: Sun, 22 Dec 2002 13:44:40
Message-Id: 20021222134006.A25895765@mail2.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - --------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200212-9
6 - - --------------------------------------------------------------------
7
8 PACKAGE : kde-3.0.x
9 SUMMARY : multiple vulnerabilities in KDE
10 DATE    : 2002-12-22 13:12 UTC
11 EXPLOIT : remote
12
13 - - --------------------------------------------------------------------
14
15 - From advisory:
16
17 "In some instances KDE fails to properly quote parameters of
18 instructions passed to a command shell for execution.
19
20 These parameters may incorporate data such as URLs, filenames and
21 e-mail addresses, and this data may be provided remotely to a victim
22 in an e-mail, a webpage or files on a network filesystem or other
23 untrusted source.
24
25 By carefully crafting such data an attacker might be able to
26 execute arbitary commands on a vulnerable sytem using the victim's
27 account and privileges.
28
29 The KDE Project is aware of several possible exploits of these
30 vulnerabilities and is releasing this advisory with patches to
31 correct the issues. The patches also provide better safe guards and
32 check data from untrusted sources more strictly in multiple places."
33
34 Read the full advisory at
35 http://www.kde.org/info/security/advisory-20021220-1.txt
36
37 INFORMATION REGARDING OTHER ARCHITECTURES THAN X86
38
39 kde-3.0.5a is currenlty only marked stable for x86. If you have
40 succesfully compiled and merged 3.0.5a on any other architecture
41 than x86 please report this to kde@g.o.
42
43 INFORMATION REGARDING KDE 2.2.2 AND KDE 3.1
44
45 The Gentoo KDE team is currently testing a new revision of KDE 2.2.2
46 that includes fixes for the vulnerabilities mentioned in KDEs security
47 advisory. A new GLSA will be issued when those packages are available.
48
49 KDE 3.1 has not yet been released by KDE. However, masked ebuilds exist
50 in the portage tree for various release canidates. Since KDE has not
51 released a new version that fixes these vulnerabilites no update is
52 available for those who are currently running any version of the 3.1.x
53 series. If KDE releases a new RC before the official release and when
54 KDE 3.1 final is released a new GLSA will be issued to adress the
55 vulnerabilites in the 3.1.x series.
56
57 SOLUTION
58
59 It is recommended that all Gentoo Linux users who are running
60 kde-base/kde-3.0.4 and earlier in the 3.0.x series update their
61 systems as follows:
62
63 emerge rsync
64 emerge kde
65 emerge clean
66
67 - - --------------------------------------------------------------------
68 aliz@g.o - GnuPG key is available at www.gentoo.org/~aliz
69 kde@g.o
70 - - --------------------------------------------------------------------
71 -----BEGIN PGP SIGNATURE-----
72 Version: GnuPG v1.2.1 (GNU/Linux)
73
74 iD8DBQE+BcDAfT7nyhUpoZMRAgOVAJ9+6q+PanprNTsrcsXOIyNYxKC5SgCgu0uf
75 5DJ+2iGbIo/UfiY45AKXEvY=
76 =3ZMj
77 -----END PGP SIGNATURE-----