Vulneraibilidades en programas de KDE

Gunnar Wolf gwolf en campus.iztacala.unam.mx
Mie Jun 7 11:14:21 CDT 2000




-------------------------------------------------------------------
           Gunnar Wolf    gwolf en campus.iztacala.unam.mx
     Universidad Nacional Autónoma de México, Campus Iztacala
   Jefatura de Sección de Desarrollo y Admon. de Sistemas en Red
        Area de Seguridad en Computo - DCI - DGSCA - UNAM
-------------------------------------------------------------------
  Beginner thinks 1Kb == 1000 bytes.   Master knows 1Km == 1024m

---------- Forwarded message ----------
Date: Wed, 7 Jun 2000 11:04 -0400
From: bugzilla en redhat.com
Reply-To: redhat-watch-list en redhat.com
To: redhat-watch-list en redhat.com
Cc: linux-security en redhat.com
Subject: [RHSA-2000:032-02] kdelibs vulnerability for suid-root KDE applications
Resent-Date: 7 Jun 2000 15:05:08 -0000
Resent-From: redhat-watch-list en redhat.com
Resent-cc: recipient list not shown: ;

---------------------------------------------------------------------
                   Red Hat, Inc. Security Advisory

Synopsis:          kdelibs vulnerability for suid-root KDE applications
Advisory ID:       RHSA-2000:032-02
Issue date:        2000-06-07
Updated on:        2000-06-07
Product:           Red Hat Powertools
Keywords:          N/A
Cross references:  N/A
---------------------------------------------------------------------

1. Topic:

In kdelibs 1.1.2 there are security issues for some applications when they are run suid root.

2. Relevant releases/architectures:

Red Hat Powertools 6.0 - i386
Red Hat Powertools 6.1 - i386
Red Hat Powertools 6.2 - i386

3. Problem description:

In kdelibs 1.1.2, there are security issues with the way some applications perform when they are run suid root. The only application vulnerable is kwintv from Powertools. With our PAM configuration, the suid bit for kwintv is not necessary.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Uvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

N/A

6. RPMs required:

Red Hat Powertools 6.2:

intel:
ftp://ftp.redhat.com/redhat/updates/powertools/6.2/i386/kwintv-0.7.5-2.i386.rpm

sources:
ftp://ftp.redhat.com/redhat/updates/powertools/6.2/SRPMS/kwintv-0.7.5-2.src.rpm

7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
3757f47ebfcec111e6a63167873653ee  6.2/SRPMS/kwintv-0.7.5-2.src.rpm
72e10bb7dfb96a7c655a7f3db79d47a1  6.2/i386/kwintv-0.7.5-2.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:

N/A




-- 
         To unsubscribe: mail redhat-watch-list-request en redhat.com with 
                       "unsubscribe" as the Subject.


-- 
Para desuscribirse, mande correo a: ayuda-unsubscribe en linux.org.mx
Para comandos adicionales, envíelo a: ayuda-help en linux.org.mx




Más información sobre la lista de distribución Ayuda