-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------- Messaggio inoltrato ----------
Subject: [Security Announce] MDKSA-2002:064 - kdelibs update
Date: 9 Oct 2002 18:07:31 -0000
From: Mandrake Linux Security Team <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
__________________________________________________________
Mandrake Linux Security Update Advisory
_______________________________________________________________
Package name: kdelibs
Advisory ID: MDKSA-2002:064
Date: October 9th, 2002
Affected versions: 8.1, 8.2
_____
Problem Description:
A vulnerability was discovered in Konqueror's cross site scripting
protection, in that it fails to initialize the domains on
sub-(i)frames correctly. Because of this, javascript may access any
foreign subframe which is defined in the HTML source, which can be
used to steal cookies from the client and allow other cross-site
scripting attacks. This also affects other KDE software that uses
the KHTML rendering engine.
This is fixed in KDE 3.0.3a, and the KDE team provided a patch for
KDE 2.2.2. This patch has been applied to the following packages.
After upgrading kdelibs, you must restart KDE in order for the fix
to work.
_____________________________________________________________________
References:
http://www.kde.org/info/security/advisory-20020908-2.txt
http://online.securityfocus.com/archive/1/290710/2002-09-03/2002-09-
09/0
____________________________________________________________________
Updated Packages:
Mandrake Linux 8.1:
7ce7be3ca493d67d3913e10862da1d3a
8.1/RPMS/arts-2.2.1-6.1mdk.i586.rpm 86dcecb245a1938e61a280ee07ac6202
8.1/RPMS/kdelibs-2.2.1-6.1mdk.i586.rpm
bb56ed402ed351b66f32434ecd4b200e
8.1/RPMS/kdelibs-devel-2.2.1-6.1mdk.i586.rpm
3ff471d61f793817dd5814e875f1abfd
8.1/RPMS/kdelibs-sound-2.2.1-6.1mdk.i586.rpm
916124421959b33f61eacc56bc013de2
8.1/RPMS/kdelibs-static-devel-2.2.1-6.1mdk.i586.rpm
205a0e0dea10c8731a798642af278720
8.1/RPMS/libarts2-2.2.1-6.1mdk.i586.rpm
f90b7a7b7c5eafa5a0c518be7b7487e6
8.1/RPMS/libarts2-devel-2.2.1-6.1mdk.i586.rpm
0d3e9cd99ad563e6d71b31c5857797e5
8.1/SRPMS/kdelibs-2.2.1-6.1mdk.src.rpm
Mandrake Linux 8.1/ia64:
d3615751eccb0304e1e51d8a528b10f1
ia64/8.1/RPMS/arts-2.2.1-6.1mdk.ia64.rpm
89497e1ecc10f1638fb74614cc62795a
ia64/8.1/RPMS/kdelibs-2.2.1-6.1mdk.ia64.rpm
980daf160933a255c3a13e8176380a85
ia64/8.1/RPMS/kdelibs-devel-2.2.1-6.1mdk.ia64.rpm
8781055d0913b952bf145193bf9b5137
ia64/8.1/RPMS/kdelibs-sound-2.2.1-6.1mdk.ia64.rpm
aedc8af829ff65b058d458708ea4181e
ia64/8.1/RPMS/kdelibs-static-devel-2.2.1-6.1mdk.ia64.rpm
0dedf656a4556867c049836ef4c8742d
ia64/8.1/RPMS/libarts2-2.2.1-6.1mdk.ia64.rpm
3c912b94a99493c14827ac7c641a7438
ia64/8.1/RPMS/libarts2-devel-2.2.1-6.1mdk.ia64.rpm
0d3e9cd99ad563e6d71b31c5857797e5
ia64/8.1/SRPMS/kdelibs-2.2.1-6.1mdk.src.rpm
Mandrake Linux 8.2:
118b8d5eb0b526d1de7c7a80ee803dce
8.2/RPMS/arts-2.2.2-49.1mdk.i586.rpm
232e115b83e87dbbca213320edbaaf64
8.2/RPMS/kdelibs-2.2.2-49.1mdk.i586.rpm
2a0b2ec2bbdbeffcc29c1316f6528a72
8.2/RPMS/kdelibs-devel-2.2.2-49.1mdk.i586.rpm
f60656b26c3699b3e5289ebdb194d356
8.2/RPMS/kdelibs-sound-2.2.2-49.1mdk.i586.rpm
90a5b7a77dd2a98f712fe3f46a66954f
8.2/RPMS/libarts2-2.2.2-49.1mdk.i586.rpm
41714ca5667ed8e7d2b70d11d33b5719
8.2/RPMS/libarts2-devel-2.2.2-49.1mdk.i586.rpm
05fa6ced5c8a1519ae408e3944a25b36
8.2/SRPMS/kdelibs-2.2.2-49.1mdk.src.rpm
Mandrake Linux 8.2/ppc:
cf6838cdd72acdd3dd87d3564be0b533
ppc/8.2/RPMS/arts-2.2.2-49.1mdk.ppc.rpm
1f584290c7dfbf8d78f91f0366400f03
ppc/8.2/RPMS/kdelibs-2.2.2-49.1mdk.ppc.rpm
03ac2ca03f3ee1d2bfc69375f7f40bc1
ppc/8.2/RPMS/kdelibs-devel-2.2.2-49.1mdk.ppc.rpm
5fa810a9712cffa7f369bb348cd68838
ppc/8.2/RPMS/kdelibs-sound-2.2.2-49.1mdk.ppc.rpm
2938f580f2659e1e262bef2e53845809
ppc/8.2/RPMS/libarts2-2.2.2-49.1mdk.ppc.rpm
dcaceac18c3a0868ed21e0b444591140
ppc/8.2/RPMS/libarts2-devel-2.2.2-49.1mdk.ppc.rpm
05fa6ced5c8a1519ae408e3944a25b36
ppc/8.2/SRPMS/kdelibs-2.2.2-49.1mdk.src.rpm
____________________________________________________________________
Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
_____________________________________________________________________
To upgrade automatically, use MandrakeUpdate. The verification of
md5 checksums and GPG signatures is performed automatically for you.
If you want to upgrade manually, download the updated package from
one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A
list of FTP mirrors can be obtained from:
http://www.mandrakesecure.net/en/ftp.php
Please verify the update prior to upgrading to ensure the integrity
of the downloaded package. You can do this with the command:
rpm --checksig <filename>
All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team from:
https://www.mandrakesecure.net/RPM-GPG-KEYS
Please be aware that sometimes it takes the mirrors a few hours to
update.
You can view other update advisories for Mandrake Linux at:
http://www.mandrakesecure.net/en/advisories/
MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained
by visiting:
http://www.mandrakesecure.net/en/mlist.php
If you want to report vulnerabilities, please contact
[EMAIL PROTECTED]
_____________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<[EMAIL PROTECTED]>
bye
miKe
_______________________________________
Slackware 8.1 GNU/Linux 2.4.19 @ hp Xe3
R.U.#219755 - S.R.U.#705 - R.M.#110932
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE9pJzOF/9fksDJ4y0RAj0HAJ0UtmY2MIbnoRtLZyvUsBE3AeGH0ACfZO7f
aC0vXF1MYSRqzDfJx/uSMRA=
=pXWp
-----END PGP SIGNATURE-----