dcsimg
Linux Today: Linux News On Internet Time.





More on LinuxToday


Fedora Core Advisories: kdebase, kdelibs, lha

Sep 08, 2004, 18:14 (0 Talkback[s])

Fedora Update Notification
FEDORA-2004-292
2004-09-08

Product : Fedora Core 1
Name : kdebase
Version : 3.1.4
Release : 7
Summary : K Desktop Environment - core files

Description :
Core applications for the K Desktop Environment. Included are: kdm (replacement for xdm), kwin (window manager), konqueror (filemanager, web browser, ftp client, ...), konsole (xterm replacement), kpanel (application starter and desktop pager), kaudio (audio server), kdehelp (viewer for kde help files, info and man pages), kthememgr (system for managing alternate theme packages) plus other KDE components (kcheckpass, kikbd, kscreensaver, kcontrol, kfind, kfontmanager, kmenuedit).


Update Information:

Andrew Tuitt reported that versions of KDE up to and including 3.2.3 create temporary directories with predictable names. A local attacker could prevent KDE applications from functioning correctly, or overwrite files owned by other users by creating malicious symlinks. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0689 to this issue.

WESTPOINT internet reconnaissance services has discovered that the KDE web browser Konqueror allows websites to set cookies for certain country specific secondary top level domains. An attacker within one of the affected domains could construct a cookie which would be sent to all other websites within the domain leading to a session fixation attack. This issue does not affect popular domains such as .co.uk, .co.in, or .com. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0721 to this issue.

A frame injection spoofing vulnerability has been discovered in the Konqueror web browser. This issue could allow a malicious website to show arbitrary content in a named frame of a different browser window. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0746 to this issue.

All users of KDE are advised to upgrade to these packages, which contain backported patches from the KDE team for these issues.

  • Wed Sep 01 2004 Than Ngo <than@redhat.com> 6:3.1.4-7
    • Konqueror Frame Injection Vulnerability, CAN-2004-0721

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

3004c6dd30bc64d3631acd3d2219814d SRPMS/kdebase-3.1.4-7.src.rpm
e91dc13e33256a43b283372e4c7d112c x86_64/kdebase-3.1.4-7.x86_64.rpm
21b010b35a8ed93dc8ab0c53a6e37f06 x86_64/kdebase-devel-3.1.4-7.x86_64.rpm
4c89d11b04180f76815b531a52d0d19c x86_64/debug/kdebase-debuginfo-3.1.4-7.x86_64.rpm
d0ec97d874f9a5c9b380c6aee2fa5d64 i386/kdebase-3.1.4-7.i386.rpm
af1d70916ef1fc53b7dd2f999650374a i386/kdebase-devel-3.1.4-7.i386.rpm
df6a6e5af583325164291aaeaeca4269 i386/debug/kdebase-debuginfo-3.1.4-7.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2004-291
2004-09-08

Product : Fedora Core 2
Name : kdelibs
Version : 3.2.2
Release : 8.FC2
Summary : K Desktop Environment - Libraries

Description :
Libraries for the K Desktop Environment: KDE Libraries included: kdecore (KDE core library), kdeui (user interface), kfm (file manager), khtmlw (HTML widget), kio (Input/Output, networking), kspell (spelling checker), jscript (javascript), kab (addressbook), kimgio (image manipulation).


Update Information:

Andrew Tuitt reported that versions of KDE up to and including 3.2.3 create temporary directories with predictable names. A local attacker could prevent KDE applications from functioning correctly, or overwrite files owned by other users by creating malicious symlinks. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0689 to this issue.

WESTPOINT internet reconnaissance services has discovered that the KDE web browser Konqueror allows websites to set cookies for certain country specific secondary top level domains. An attacker within one of the affected domains could construct a cookie which would be sent to all other websites within the domain leading to a session fixation attack. This issue does not affect popular domains such as .co.uk, .co.in, or .com. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0721 to this issue.

A frame injection spoofing vulnerability has been discovered in the Konqueror web browser. This issue could allow a malicious website to show arbitrary content in a named frame of a different browser window. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0746 to this issue.

All users of KDE are advised to upgrade to these packages, which contain backported patches from the KDE team for these issues.

  • Wed Sep 01 2004 Than Ngo <than@redhat.com> 6:3.2.2-8.FC2
    • Konqueror Frame Injection Vulnerability CAN-2004-0721
    • Konqueror Cross-Domain Cookie Injection CAN-2004-0746
  • Wed Jul 28 2004 Than Ngo <than@redhat.com> 6:3.2.2-7
    • DCOPServer Temporary Filename Vulnerability, CAN-2004-0690
    • temporary directory vulnerability, CAN-2004-0689

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

1f58d8b1b9a5598e249f9cca9dfd989d SRPMS/kdelibs-3.2.2-8.FC2.src.rpm
b5106d0e1e28796c79df11a798d1e1bb x86_64/kdelibs-3.2.2-8.FC2.x86_64.rpm
9460641c334c4e448cd94f20dfda49fd x86_64/kdelibs-devel-3.2.2-8.FC2.x86_64.rpm
82353b5f48c540655dbec591ff6afa28 x86_64/debug/kdelibs-debuginfo-3.2.2-8.FC2.x86_64.rpm
bbe4cd8f2842be7209f7821d8548926a i386/kdelibs-3.2.2-8.FC2.i386.rpm
9d25c78e9ae1e911411c47f8f4aaae2f i386/kdelibs-devel-3.2.2-8.FC2.i386.rpm
3cb3189b5c72aa10fef2bfb99b2059d2 i386/debug/kdelibs-debuginfo-3.2.2-8.FC2.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2004-290
2004-09-08

Product : Fedora Core 1
Name : kdelibs
Version : 3.1.4
Release : 7
Summary : K Desktop Environment - Libraries

Description :
Libraries for the K Desktop Environment: KDE Libraries included: kdecore (KDE core library), kdeui (user interface), kfm (file manager), khtmlw (HTML widget), kio (Input/Output, networking), kspell (spelling checker), jscript (javascript), kab (addressbook), kimgio (image manipulation).


Update Information:

Andrew Tuitt reported that versions of KDE up to and including 3.2.3 create temporary directories with predictable names. A local attacker could prevent KDE applications from functioning correctly, or overwrite files owned by other users by creating malicious symlinks. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0689 to this issue.

WESTPOINT internet reconnaissance services has discovered that the KDE web browser Konqueror allows websites to set cookies for certain country specific secondary top level domains. An attacker within one of the affected domains could construct a cookie which would be sent to all other websites within the domain leading to a session fixation attack. This issue does not affect popular domains such as .co.uk, .co.in, or .com. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0721 to this issue.

A frame injection spoofing vulnerability has been discovered in the Konqueror web browser. This issue could allow a malicious website to show arbitrary content in a named frame of a different browser window. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0746 to this issue.

All users of KDE are advised to upgrade to these erratum packages, which contain backported patches from the KDE team for these issues.


  • Wed Sep 01 2004 Than Ngo <than@redhat.com> 6:3.1.4-7
    • Konqueror Frame Injection Vulnerability CAN-2004-0721
    • Konqueror Cross-Domain Cookie Injection CAN-2004-0746
  • Wed Jul 28 2004 Than Ngo <than@redhat.com> 6:3.1.4-6
    • temporary directory vulnerability, CAN-2004-0689

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

008938cbdcd2153b84d2dda1cbcbf887 SRPMS/kdelibs-3.1.4-7.src.rpm
eb7ea45f4d74c1445336bcef9761f02f x86_64/kdelibs-3.1.4-7.x86_64.rpm
09e622613f98b001d548815e0e8a8a1e x86_64/kdelibs-devel-3.1.4-7.x86_64.rpm
5b239bdfa7ccadb00fe6eca14b4c0593 x86_64/debug/kdelibs-debuginfo-3.1.4-7.x86_64.rpm
61cef6ddcc8a103f0aae6d7c8a31e224 i386/kdelibs-3.1.4-7.i386.rpm
987c650d14f71dc848cce75f8bf4dc3a i386/kdelibs-devel-3.1.4-7.i386.rpm
b2831db469e778da7a7d4073d6cb5517 i386/debug/kdelibs-debuginfo-3.1.4-7.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2004-294
2004-09-08

Product : Fedora Core 1
Name : lha
Version : 1.14i
Release : 12.2
Summary : An archiving and compression utility for LHarc format

archives.
Description :
LHA is an archiving and compression utility for LHarc format archives. LHA is mostly used in the DOS world, but can be used under Linux to extract DOS files from LHA archives.

Install the lha package if you need to extract DOS files from LHA archives.


Update Information:

Lukasz Wojtow discovered a stack-based buffer overflow in all versions of lha up to and including version 1.14. A carefully created archive could allow an attacker to execute arbitrary code when a victim extracts or tests the archive. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2004-0769 to this issue.

Buffer overflows were discovered in the command line processing of all versions of lha up to and including version 1.14. If a malicious user can trick a victim into passing a specially crafted command line to the lha command, it is possible that arbitrary code could be executed. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the names CAN-2004-0771 and CAN-2004-0694 to these issues.

Thomas Biege discovered a shell meta character command execution vulnerability in all versions of lha up to and including 1.14. An attacker could create a directory with shell meta characters in its name which could lead to arbitrary command execution. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2004-0745 to this issue.

Users of lha should update to this updated package


  • Tue Sep 07 2004 Than Ngo <than@redhat.com> 1.14i-12.2
    • security vulnerabilities CAN-2004-0769, CAN-2004-0771, CAN-2004-0694, CAN-2004-0745

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

4c8e03b8489c398e6f01c9c26e76a956 SRPMS/lha-1.14i-12.2.src.rpm
170bcabffe4609754eac38e4cab8b592 x86_64/lha-1.14i-12.2.x86_64.rpm
571754fe612bce9f0119dec63049dbca x86_64/debug/lha-debuginfo-1.14i-12.2.x86_64.rpm
6b0f4909ea0753a01a2e29319348240d i386/lha-1.14i-12.2.i386.rpm
db44f0f1eeb45ebbbd0f39e079593879 i386/debug/lha-debuginfo-1.14i-12.2.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2004-293
2004-09-08

Product : Fedora Core 2
Name : kdebase
Version : 3.2.2
Release : 6.FC2
Summary : K Desktop Environment - core files

Description :
Core applications for the K Desktop Environment. Included are: kdm (replacement for xdm), kwin (window manager), konqueror (filemanager, web browser, ftp client, ...), konsole (xterm replacement), kpanel (application starter and desktop pager), kaudio (audio server), kdehelp (viewer for kde help files, info and man pages), kthememgr (system for managing alternate theme packages) plus other KDE components (kcheckpass, kikbd, kscreensaver, kcontrol, kfind, kfontmanager, kmenuedit).


Update Information:

Andrew Tuitt reported that versions of KDE up to and including 3.2.3 create temporary directories with predictable names. A local attacker could prevent KDE applications from functioning correctly, or overwrite files owned by other users by creating malicious symlinks. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0689 to this issue.

WESTPOINT internet reconnaissance services has discovered that the KDE web browser Konqueror allows websites to set cookies for certain country specific secondary top level domains. An attacker within one of the affected domains could construct a cookie which would be sent to all other websites within the domain leading to a session fixation attack. This issue does not affect popular domains such as .co.uk, .co.in, or .com. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0721 to this issue.

A frame injection spoofing vulnerability has been discovered in the Konqueror web browser. This issue could allow a malicious website to show arbitrary content in a named frame of a different browser window. The Common Vulnerabilities and Exposures project has assigned the name CAN-2004-0746 to this issue.

All users of KDE are advised to upgrade to these packages, which contain backported patches from the KDE team for these issues.

  • Mon Sep 06 2004 Than Ngo <than@redhat.com> 6:3.2.2-6.FC2
    • fix a bug in keyboard layout with xorg.x11, bug #121950
    • fix df problem on AFS
  • Wed Sep 01 2004 Than Ngo <than@redhat.com> 6:3.2.2-5.FC2
    • Konqueror Frame Injection Vulnerability, CAN-2004-0721

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

80f87d426b760776fc7fc03653ad30a6 SRPMS/kdebase-3.2.2-6.FC2.src.rpm
6bbf33f60b428bc3f2e0fac4fa09b64f x86_64/kdebase-3.2.2-6.FC2.x86_64.rpm
8eb7ca6d4dd1557114980885744ecdfd x86_64/kdebase-devel-3.2.2-6.FC2.x86_64.rpm
4e9b9094fc7abd21083de2c17b9f51f0 x86_64/debug/kdebase-debuginfo-3.2.2-6.FC2.x86_64.rpm
a05b23c8202566417a5bc2d3a3a5cd88 i386/kdebase-3.2.2-6.FC2.i386.rpm
bc6d4263395d4af1a4b89503ff4a8e28 i386/kdebase-devel-3.2.2-6.FC2.i386.rpm
1835604099fdd8c8ed532f5c15709c0d i386/debug/kdebase-debuginfo-3.2.2-6.FC2.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.



Fedora Update Notification
FEDORA-2004-295
2004-09-08

Product : Fedora Core 2
Name : lha
Version : 1.14i
Release : 14.1
Summary : An archiving and compression utility for LHarc format

archives.
Description :
LHA is an archiving and compression utility for LHarc format archives. LHA is mostly used in the DOS world, but can be used under Linux to extract DOS files from LHA archives.

Install the lha package if you need to extract DOS files from LHA archives.


Update Information:

Lukasz Wojtow discovered a stack-based buffer overflow in all versions of lha up to and including version 1.14. A carefully created archive could allow an attacker to execute arbitrary code when a victim extracts or tests the archive. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2004-0769 to this issue.

Buffer overflows were discovered in the command line processing of all versions of lha up to and including version 1.14. If a malicious user can trick a victim into passing a specially crafted command line to the lha command, it is possible that arbitrary code could be executed. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the names CAN-2004-0771 and CAN-2004-0694 to these issues.

Thomas Biege discovered a shell meta character command execution vulnerability in all versions of lha up to and including 1.14. An attacker could create a directory with shell meta characters in its name which could lead to arbitrary command execution. The Common Vulnerabilities and Exposures project (cve.mitre.org/) has assigned the name CAN-2004-0745 to this issue.

Users of lha should update to this updated package


  • Tue Sep 07 2004 Than Ngo <than@redhat.com> 1.14i-14.1
    • security vulnerabilities CAN-2004-0769, CAN-2004-0771, CAN-2004-0694, CAN-2004-0745

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

bccb95c64b01e506961bdacb3323031b SRPMS/lha-1.14i-14.1.src.rpm
af515d31f9ff998a88383d0651efff68 x86_64/lha-1.14i-14.1.x86_64.rpm
8641060ad39c6bbe14e68014fbe06ce2 x86_64/debug/lha-debuginfo-1.14i-14.1.x86_64.rpm
494c07eccce7cd3f5a040d8fb384eb8b i386/lha-1.14i-14.1.i386.rpm
a8d018efd6c9fe0b8db6f96327557182 i386/debug/lha-debuginfo-1.14i-14.1.i386.rpm

This update can also be installed with the Update Agent; you can launch the Update Agent with the 'up2date' command.