-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2007:072 http://www.mandriva.com/security/ _______________________________________________________________________ Package : kdelibs Date : March 29, 2007 Affected: 2007.0, Corporate 3.0, Corporate 4.0 _______________________________________________________________________ Problem Description: The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in a FTP PASV command. Updated packages have been patched to address this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1564 _______________________________________________________________________ Updated Packages: Mandriva Linux 2007.0: c0c597de9778cb8206e1ed62fec046b3 2007.0/i586/kdelibs-common-3.5.4-19.4mdv2007.0.i586.rpm 68b85c647d6e117eeab8d77252ee9cf5 2007.0/i586/kdelibs-devel-doc-3.5.4-19.4mdv2007.0.i586.rpm 61d9c254adf06c805411a8d2a8ae88b9 2007.0/i586/libkdecore4-3.5.4-19.4mdv2007.0.i586.rpm 361e161cf27d52446f8d4cca3cde5399 2007.0/i586/libkdecore4-devel-3.5.4-19.4mdv2007.0.i586.rpm a94477af19ac845bdc7cb58ddc981dc9 2007.0/SRPMS/kdelibs-3.5.4-19.4mdv2007.0.src.rpm Mandriva Linux 2007.0/X86_64: d1cabaa637a4cd98c4d5d2453fe5e795 2007.0/x86_64/kdelibs-common-3.5.4-19.4mdv2007.0.x86_64.rpm 606305ad558a0f28cb0cfbdd33e84baa 2007.0/x86_64/kdelibs-devel-doc-3.5.4-19.4mdv2007.0.x86_64.rpm 7804378996ebeb4d866f08b95169dd73 2007.0/x86_64/lib64kdecore4-3.5.4-19.4mdv2007.0.x86_64.rpm a2f440c1e184ba56d4e6dd206575e739 2007.0/x86_64/lib64kdecore4-devel-3.5.4-19.4mdv2007.0.x86_64.rpm a94477af19ac845bdc7cb58ddc981dc9 2007.0/SRPMS/kdelibs-3.5.4-19.4mdv2007.0.src.rpm Corporate 3.0: bfd644bf673c34bcdc40f16cf0b37b0d corporate/3.0/i586/kdelibs-common-3.2-36.18.C30mdk.i586.rpm af2ffbed7fd04d59bcebae3b4bfe71eb corporate/3.0/i586/libkdecore4-3.2-36.18.C30mdk.i586.rpm 42e3a51ec6aac2a2c9e2ae4971910087 corporate/3.0/i586/libkdecore4-devel-3.2-36.18.C30mdk.i586.rpm 5575864f778b851db8fdaf8099bcc813 corporate/3.0/SRPMS/kdelibs-3.2-36.18.C30mdk.src.rpm Corporate 3.0/X86_64: 931bef1ba4a2c3dbff91cd1d9b4dd606 corporate/3.0/x86_64/kdelibs-common-3.2-36.18.C30mdk.x86_64.rpm f1228776d803fe9d126705cbd8ae90c6 corporate/3.0/x86_64/lib64kdecore4-3.2-36.18.C30mdk.x86_64.rpm 90c14b9533af7b0a94ce86f6f6862743 corporate/3.0/x86_64/lib64kdecore4-devel-3.2-36.18.C30mdk.x86_64.rpm 5575864f778b851db8fdaf8099bcc813 corporate/3.0/SRPMS/kdelibs-3.2-36.18.C30mdk.src.rpm Corporate 4.0: 99ce0c5be728891343589c6e43e29584 corporate/4.0/i586/kdelibs-arts-3.5.4-2.5.20060mlcs4.i586.rpm c8d918697e252a90412e205a310116c4 corporate/4.0/i586/kdelibs-common-3.5.4-2.5.20060mlcs4.i586.rpm e9b51f7417d497700dede43bb194d468 corporate/4.0/i586/kdelibs-devel-doc-3.5.4-2.5.20060mlcs4.i586.rpm e3a58c49c5687673f5cffaf85838f425 corporate/4.0/i586/libkdecore4-3.5.4-2.5.20060mlcs4.i586.rpm 756ef302380caad03d383c44eee28147 corporate/4.0/i586/libkdecore4-devel-3.5.4-2.5.20060mlcs4.i586.rpm c5507e07961ca39859483995ddff7a34 corporate/4.0/SRPMS/kdelibs-3.5.4-2.5.20060mlcs4.src.rpm Corporate 4.0/X86_64: a1fc572f298d659cbcf47746eac2eb03 corporate/4.0/x86_64/kdelibs-arts-3.5.4-2.5.20060mlcs4.x86_64.rpm 2fa636d65a3b1ef56611d250fa40db4d corporate/4.0/x86_64/kdelibs-common-3.5.4-2.5.20060mlcs4.x86_64.rpm 9eb6a39a045cbad4d97895e49defe523 corporate/4.0/x86_64/kdelibs-devel-doc-3.5.4-2.5.20060mlcs4.x86_64.rpm bd29b8c1f173f373bd43a0f2672f2ffd corporate/4.0/x86_64/lib64kdecore4-3.5.4-2.5.20060mlcs4.x86_64.rpm b99795fa58545d3eef9a47fcd821b116 corporate/4.0/x86_64/lib64kdecore4-devel-3.5.4-2.5.20060mlcs4.x86_64.rpm c5507e07961ca39859483995ddff7a34 corporate/4.0/SRPMS/kdelibs-3.5.4-2.5.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFGC/9MmqjQ0CJFipgRAnBSAKCsTHavuZPB3lFUfv4UpRINWyXE4ACfWoYN 42pmDIWgS7Cogq2fNX/zre8= =BU3y -----END PGP SIGNATURE-----