what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 26977

Secunia Security Advisory 26977
Posted Sep 29, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for kdebase. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, mandriva
SHA-256 | 1b5ac38997dd2a508a0815131f9eb3e2e97ad6723becbd9346d893514b85775c

Secunia Security Advisory 26977

Change Mirror Download


----------------------------------------------------------------------

Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.

Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/

----------------------------------------------------------------------

TITLE:
Mandriva update for kdebase

SECUNIA ADVISORY ID:
SA26977

VERIFY ADVISORY:
http://secunia.com/advisories/26977/

CRITICAL:
Not critical

IMPACT:
Security Bypass

WHERE:
Local system

OPERATING SYSTEM:
Mandriva Linux 2007
http://secunia.com/product/12165/

DESCRIPTION:
Mandriva has issued an update for kdebase. This fixes a security
issue, which can be exploited by malicious, local users to bypass
certain security restrictions.

For more information:
SA26894

SOLUTION:
Apply updated packages.

-- Mandriva Linux 2007 --

ed95f0866adcc9061a1be7cc2f71732a
2007.0/i586/kdebase-3.5.4-35.5mdv2007.0.i586.rpm
20fbdefc98bb62fae257342950774cd8
2007.0/i586/kdebase-common-3.5.4-35.5mdv2007.0.i586.rpm
9156ef220fd56e3a30870c488402eba3
2007.0/i586/kdebase-kate-3.5.4-35.5mdv2007.0.i586.rpm
ca1197ce8ec9810f802c8c715faf249c
2007.0/i586/kdebase-kdeprintfax-3.5.4-35.5mdv2007.0.i586.rpm
86b4fb370db6503dd493682a0554b053
2007.0/i586/kdebase-kdm-3.5.4-35.5mdv2007.0.i586.rpm
35e68ba7b6e36bc8067f1fa3f454e4ff
2007.0/i586/kdebase-kmenuedit-3.5.4-35.5mdv2007.0.i586.rpm
74fd4ca948278dfcf6fc6877c68ce919
2007.0/i586/kdebase-konsole-3.5.4-35.5mdv2007.0.i586.rpm
17b6947e93cdaa7e6729a22f7a871bda
2007.0/i586/kdebase-nsplugins-3.5.4-35.5mdv2007.0.i586.rpm
47cee3a1165a9dd5dbbd0c0140b44057
2007.0/i586/kdebase-progs-3.5.4-35.5mdv2007.0.i586.rpm
ddc5c70cab92ee7d60dd93fdec81973d
2007.0/i586/libkdebase4-3.5.4-35.5mdv2007.0.i586.rpm
cf92676be0c9794d498d79a6eeebd294
2007.0/i586/libkdebase4-devel-3.5.4-35.5mdv2007.0.i586.rpm
e384a2390808db44e10f8c9b2c98b957
2007.0/i586/libkdebase4-kate-3.5.4-35.5mdv2007.0.i586.rpm
2d3f673d5a57ed2af65715df9562ef6b
2007.0/i586/libkdebase4-kate-devel-3.5.4-35.5mdv2007.0.i586.rpm
6f751d5864a2f8b02d2fcb457baa389c
2007.0/i586/libkdebase4-kmenuedit-3.5.4-35.5mdv2007.0.i586.rpm
826a238be86d001596bb496809bbc97f
2007.0/i586/libkdebase4-konsole-3.5.4-35.5mdv2007.0.i586.rpm
99a81ef71314ea78da17d61dff80573c
2007.0/SRPMS/kdebase-3.5.4-35.5mdv2007.0.src.rpm

-- Mandriva Linux 2007/X86_64 --

44790cfa5b08b21e8576af4ff3d060d0
2007.0/x86_64/kdebase-3.5.4-35.5mdv2007.0.x86_64.rpm
357266037580782f76eadcb43ba7534f
2007.0/x86_64/kdebase-common-3.5.4-35.5mdv2007.0.x86_64.rpm
bcc05ade84a36836d1b9b572637fccfb
2007.0/x86_64/kdebase-kate-3.5.4-35.5mdv2007.0.x86_64.rpm
1891d558ff46fec886f2d6a3e31bc297
2007.0/x86_64/kdebase-kdeprintfax-3.5.4-35.5mdv2007.0.x86_64.rpm
fd1ca3c7ded0401852da46e09432a758
2007.0/x86_64/kdebase-kdm-3.5.4-35.5mdv2007.0.x86_64.rpm
64c2bd60c19df0ea5a18176d7b59a5a6
2007.0/x86_64/kdebase-kmenuedit-3.5.4-35.5mdv2007.0.x86_64.rpm
b4179a132b796afebfd3ffa7d07aca3f
2007.0/x86_64/kdebase-konsole-3.5.4-35.5mdv2007.0.x86_64.rpm
87928d82fc35349e692207f12947ddfd
2007.0/x86_64/kdebase-nsplugins-3.5.4-35.5mdv2007.0.x86_64.rpm
9ab48e9c1003415981f2b7b53ffb6873
2007.0/x86_64/kdebase-progs-3.5.4-35.5mdv2007.0.x86_64.rpm
da0f202940d03b8bc49accdb2a51b060
2007.0/x86_64/lib64kdebase4-3.5.4-35.5mdv2007.0.x86_64.rpm
d9998a998d77cdac73729787beea7550
2007.0/x86_64/lib64kdebase4-devel-3.5.4-35.5mdv2007.0.x86_64.rpm
227442038377db2587454c6a1a5ec462
2007.0/x86_64/lib64kdebase4-kate-3.5.4-35.5mdv2007.0.x86_64.rpm
11303b19dc729c00cdb47e8b873787ec
2007.0/x86_64/lib64kdebase4-kate-devel-3.5.4-35.5mdv2007.0.x86_64.rpm
178acb8477c40e6d225825d23e7745bc
2007.0/x86_64/lib64kdebase4-kmenuedit-3.5.4-35.5mdv2007.0.x86_64.rpm
090a8fd1c95df07eb5f41335da0746a6
2007.0/x86_64/lib64kdebase4-konsole-3.5.4-35.5mdv2007.0.x86_64.rpm
99a81ef71314ea78da17d61dff80573c
2007.0/SRPMS/kdebase-3.5.4-35.5mdv2007.0.src.rpm

ORIGINAL ADVISORY:
http://www.mandriva.com/security/advisories?name=MDKSA-2007:190

OTHER REFERENCES:
SA26894:
http://secunia.com/advisories/26894/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close