---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Mandriva update for kdebase SECUNIA ADVISORY ID: SA16715 VERIFY ADVISORY: http://secunia.com/advisories/16715/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Mandrakelinux 10.1 http://secunia.com/product/4198/ DESCRIPTION: Mandriva has issued an update for kdebase. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. For more information: SA16692 SOLUTION: Apply updated packages. Mandrakelinux 10.1 fde6f11dca5fa72d8b892326ef18af39 10.1/RPMS/kdebase-3.2.3-134.9.101mdk.i586.rpm af8c908d2d1e82d38057d8c2a85226ae 10.1/RPMS/kdebase-common-3.2.3-134.9.101mdk.i586.rpm 82059179465feed8f4aa87eeb09083c6 10.1/RPMS/kdebase-kate-3.2.3-134.9.101mdk.i586.rpm 31551dc2a3ccd80305a0b7aec7d525a2 10.1/RPMS/kdebase-kcontrol-data-3.2.3-134.9.101mdk.i586.rpm 256d4d84ec2af022ca1a91f91f4becbe 10.1/RPMS/kdebase-kcontrol-nsplugins-3.2.3-134.9.101mdk.i586.rpm bc75565668aee981f4170b082c875973 10.1/RPMS/kdebase-kdeprintfax-3.2.3-134.9.101mdk.i586.rpm 3b1aa69777ca0380a598687febccf3cf 10.1/RPMS/kdebase-kdm-3.2.3-134.9.101mdk.i586.rpm c4aa598c9468d30370eca266e5cd26d2 10.1/RPMS/kdebase-kdm-config-file-3.2.3-134.9.101mdk.i586.rpm a3a5bfacdfbeda1e5674c8c85ce33d06 10.1/RPMS/kdebase-kmenuedit-3.2.3-134.9.101mdk.i586.rpm 43989b4186ca73c933c0a14e6e8ada7e 10.1/RPMS/kdebase-konsole-3.2.3-134.9.101mdk.i586.rpm 27eb9535ade339cc18745238cdca82e7 10.1/RPMS/kdebase-nsplugins-3.2.3-134.9.101mdk.i586.rpm 2e150c90e33b4895f03afd0f150ef133 10.1/RPMS/kdebase-progs-3.2.3-134.9.101mdk.i586.rpm 5a01676e0b14f1dcfdc354f36c809a15 10.1/RPMS/libkdebase4-3.2.3-134.9.101mdk.i586.rpm 933a50f6b133a925553ebc500ffc77b2 10.1/RPMS/libkdebase4-devel-3.2.3-134.9.101mdk.i586.rpm d047b4804fa7ef86a4e358f4fa905062 10.1/RPMS/libkdebase4-kate-3.2.3-134.9.101mdk.i586.rpm 75aa31fb0122567a8f61b27c6a6b97e3 10.1/RPMS/libkdebase4-kate-devel-3.2.3-134.9.101mdk.i586.rpm 11d99a0db991f5ce81069d5a3b04996c 10.1/RPMS/libkdebase4-kmenuedit-3.2.3-134.9.101mdk.i586.rpm 1d68a5e0a0ee1e9b683726394ef1d9d4 10.1/RPMS/libkdebase4-konsole-3.2.3-134.9.101mdk.i586.rpm 79e2da009c3444e9fc8bae76a8e4bc58 10.1/SRPMS/kdebase-3.2.3-134.9.101mdk.src.rpm Mandrakelinux 10.1/X86_64 3edfcb2be06588148b7dbea26ddeb0ab x86_64/10.1/RPMS/kdebase-3.2.3-134.9.101mdk.x86_64.rpm c2222b94addf5138736253d3591fe8a5 x86_64/10.1/RPMS/kdebase-common-3.2.3-134.9.101mdk.x86_64.rpm cbb30cf71ef0ee26a742425cc0131a57 x86_64/10.1/RPMS/kdebase-kate-3.2.3-134.9.101mdk.x86_64.rpm ee1cd14197f0978fe6683d732be2d9a9 x86_64/10.1/RPMS/kdebase-kcontrol-data-3.2.3-134.9.101mdk.x86_64.rpm 9415b5810205fa4a6e40e158d73bb793 x86_64/10.1/RPMS/kdebase-kcontrol-nsplugins-3.2.3-134.9.101mdk.x86_64.rpm 3b273879aba8c243abd365032cc12e10 x86_64/10.1/RPMS/kdebase-kdeprintfax-3.2.3-134.9.101mdk.x86_64.rpm d263866608db223d7c8003d873885327 x86_64/10.1/RPMS/kdebase-kdm-3.2.3-134.9.101mdk.x86_64.rpm c0e041f29979178df76dc8ae20f5c71f x86_64/10.1/RPMS/kdebase-kdm-config-file-3.2.3-134.9.101mdk.x86_64.rpm 53ea70085e2b73a1fcf716307b3c1f7a x86_64/10.1/RPMS/kdebase-kmenuedit-3.2.3-134.9.101mdk.x86_64.rpm 24c0b0f3cf506ce3c0fa4ea383c43312 x86_64/10.1/RPMS/kdebase-konsole-3.2.3-134.9.101mdk.x86_64.rpm 72c06b57b925085a85ea1532299a8c12 x86_64/10.1/RPMS/kdebase-nsplugins-3.2.3-134.9.101mdk.x86_64.rpm f2b612031c9b753acdeca70da2761c14 x86_64/10.1/RPMS/kdebase-progs-3.2.3-134.9.101mdk.x86_64.rpm 2be4621405105330c569a2d3371f7912 x86_64/10.1/RPMS/lib64kdebase4-3.2.3-134.9.101mdk.x86_64.rpm 47fa9328d312663c970a0ea02f7ece97 x86_64/10.1/RPMS/lib64kdebase4-devel-3.2.3-134.9.101mdk.x86_64.rpm 2c46a175a2d53cc9e71e1c7e80fc515f x86_64/10.1/RPMS/lib64kdebase4-kate-3.2.3-134.9.101mdk.x86_64.rpm 7ca3088d0a3fde613c6fc99bff434904 x86_64/10.1/RPMS/lib64kdebase4-kate-devel-3.2.3-134.9.101mdk.x86_64.rpm 4333de20ac19527f2ed54590e13c668e x86_64/10.1/RPMS/lib64kdebase4-kmenuedit-3.2.3-134.9.101mdk.x86_64.rpm 45b52dcf04ef25fecc47179f699e8c6a x86_64/10.1/RPMS/lib64kdebase4-konsole-3.2.3-134.9.101mdk.x86_64.rpm 5a01676e0b14f1dcfdc354f36c809a15 x86_64/10.1/RPMS/libkdebase4-3.2.3-134.9.101mdk.i586.rpm d047b4804fa7ef86a4e358f4fa905062 x86_64/10.1/RPMS/libkdebase4-kate-3.2.3-134.9.101mdk.i586.rpm 11d99a0db991f5ce81069d5a3b04996c x86_64/10.1/RPMS/libkdebase4-kmenuedit-3.2.3-134.9.101mdk.i586.rpm 1d68a5e0a0ee1e9b683726394ef1d9d4 x86_64/10.1/RPMS/libkdebase4-konsole-3.2.3-134.9.101mdk.i586.rpm 79e2da009c3444e9fc8bae76a8e4bc58 x86_64/10.1/SRPMS/kdebase-3.2.3-134.9.101mdk.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2005:160 OTHER REFERENCES: SA16692: http://secunia.com/advisories/16692/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------