bugzilla@redhat.com
2000-Jun-07  08:04 UTC
[RHSA-2000:032-02] kdelibs vulnerability for suid-root KDE applications
---------------------------------------------------------------------
                   Red Hat, Inc. Security Advisory
Synopsis:          kdelibs vulnerability for suid-root KDE applications
Advisory ID:       RHSA-2000:032-02
Issue date:        2000-06-07
Updated on:        2000-06-07
Product:           Red Hat Powertools
Keywords:          N/A
Cross references:  N/A
---------------------------------------------------------------------
1. Topic:
In kdelibs 1.1.2 there are security issues for some applications when they are
run suid root.
2. Relevant releases/architectures:
Red Hat Powertools 6.0 - i386
Red Hat Powertools 6.1 - i386
Red Hat Powertools 6.2 - i386
3. Problem description:
In kdelibs 1.1.2, there are security issues with the way some applications
perform when they are run suid root. The only application vulnerable is kwintv
from Powertools. With our PAM configuration, the suid bit for kwintv is not
necessary.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Uvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
N/A
6. RPMs required:
Red Hat Powertools 6.2:
intel:
ftp://ftp.redhat.com/redhat/updates/powertools/6.2/i386/kwintv-0.7.5-2.i386.rpm
sources:
ftp://ftp.redhat.com/redhat/updates/powertools/6.2/SRPMS/kwintv-0.7.5-2.src.rpm
7. Verification:
MD5 sum                           Package Name
--------------------------------------------------------------------------
3757f47ebfcec111e6a63167873653ee  6.2/SRPMS/kwintv-0.7.5-2.src.rpm
72e10bb7dfb96a7c655a7f3db79d47a1  6.2/i386/kwintv-0.7.5-2.i386.rpm
These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
    rpm --checksig  <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>
8. References:
N/A
Possibly Parallel Threads
- [RHSA-2000:005-05] New majordomo packages available
- [RHSA-2000:042-01] BitchX denial of service vulnerability
- [RHSA-2000:049-02] Remote file access vulnerability in ntop
- [RHSA-2000:016-03] Multiple local imwheel vulnerabilities
- Forw: [RHSA-1999:015-01] KDE update for Red Hat Linux 6.0
