Secunia Security Advisory - Ubuntu has issued an update for kdelibs. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.
1140e0e3952d19fc258effe1123f581eef5cedfd1f32e759368ac76a1fbd6c62
----------------------------------------------------------------------
Want a new IT Security job?
Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Ubuntu update for kdelibs
SECUNIA ADVISORY ID:
SA15199
VERIFY ADVISORY:
http://secunia.com/advisories/15199/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
OPERATING SYSTEM:
Ubuntu Linux 5.04
http://secunia.com/product/5036/
DESCRIPTION:
Ubuntu has issued an update for kdelibs. This fixes a vulnerability,
which potentially can be exploited by malicious people to compromise
a vulnerable system.
For more information:
SA14908
SOLUTION:
Apply updated packages.
-- Ubuntu 5.04 (Hoary Hedgehog) --
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.1.diff.gz
Size/MD5: 359873 e047143bce6bc7c4d513ef39f4d9032d
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.1.dsc
Size/MD5: 1334 84191cecdc42f082bb47bf9e0381360e
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0.orig.tar.gz
Size/MD5: 20024253 471740de13cfed37d35eb180fc1b9b38
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.1_i386.deb
Size/MD5: 1300478 e9cbaccebc510a3ab29de999a83ed709
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.1_i386.deb
Size/MD5: 838688 1e6e6725942aeb513c9b441d5c41cb07
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.1_i386.deb
Size/MD5: 8395642 d44b82cf611cfbd160593bc05762c622
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.4.0-0ubuntu3.1_all.deb
Size/MD5: 19822 32b8820b1483ce73ba15ffa9d0330487
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.4.0-0ubuntu3.1_all.deb
Size/MD5: 8012690 88e4dbac643daaf7235598d8b94a7728
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.4.0-0ubuntu3.1_all.deb
Size/MD5: 12072382 58c8c8767295c9ef9b11f2889530c840
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.1_amd64.deb
Size/MD5: 8968464 7674d54d68aea22b36319bf1c6051985
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.1_amd64.deb
Size/MD5: 920772 97a404d13d87a8cc93d0562ff60d1fb2
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.1_amd64.deb
Size/MD5: 1303100 8f11bcf3fb6748dc8231b55e055d481d
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.4.0-0ubuntu3.1_powerpc.deb
Size/MD5: 1303876 0083b3b318bce500c7bf47a2fa06ba67
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4_3.4.0-0ubuntu3.1_powerpc.deb
Size/MD5: 8367604 80b397e0202fda0ac246797e0ad093e3
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-bin_3.4.0-0ubuntu3.1_powerpc.deb
Size/MD5: 903598 9cc850b736e63ee742dd45edc0b56797
ORIGINAL ADVISORY:
http://www.ubuntulinux.org/support/documentation/usn/usn-114-1
OTHER REFERENCES:
SA14908:
http://secunia.com/advisories/14908/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------