[RHSA-2005:416-01] Low: kdbg security update
bugzilla at redhat.com
bugzilla at redhat.com
Thu Jun 2 14:34:00 UTC 2005
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Low: kdbg security update
Advisory ID: RHSA-2005:416-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-416.html
Issue date: 2005-06-02
Updated on: 2005-06-02
Product: Red Hat Enterprise Linux
CVE Names: CAN-2003-0644
- ---------------------------------------------------------------------
1. Summary:
An updated kdbg package that fixes a minor security issue is now available
for Red Hat Enterprise Linux 2.1.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
3. Problem description:
Kdbg is a K Desktop Environment (KDE) GUI for gdb, the GNU debugger.
Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file.
If a program is located in a world-writable location, it is possible for a
local user to inject malicious commands. These commands are then executed
with the permission of any user that runs Kdbg. The Common Vulnerabilities
and Exposures project assigned the name CAN-2003-0644 to this issue.
Users of Kdbg should upgrade to this updated package, which contains a
backported patch to correct this issue.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
155917 - CAN-2003-0644 kdbg arbitrary command execution
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kdbg-1.2.1-7.src.rpm
cf1154f5fb61b845d9293bb78fefb959 kdbg-1.2.1-7.src.rpm
i386:
42febfeae98126086022d45f5ac91815 kdbg-1.2.1-7.i386.rpm
ia64:
3b96bfde38afa4aa861cfce88288a32f kdbg-1.2.1-7.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/kdbg-1.2.1-7.src.rpm
cf1154f5fb61b845d9293bb78fefb959 kdbg-1.2.1-7.src.rpm
ia64:
3b96bfde38afa4aa861cfce88288a32f kdbg-1.2.1-7.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kdbg-1.2.1-7.src.rpm
cf1154f5fb61b845d9293bb78fefb959 kdbg-1.2.1-7.src.rpm
i386:
42febfeae98126086022d45f5ac91815 kdbg-1.2.1-7.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kdbg-1.2.1-7.src.rpm
cf1154f5fb61b845d9293bb78fefb959 kdbg-1.2.1-7.src.rpm
i386:
42febfeae98126086022d45f5ac91815 kdbg-1.2.1-7.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://lists.kde.org/?l=kde-announce&m=106296509815092&w=2
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0644
8. Contact:
The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFCnxjLXlSAg2UNWIIRAo/JAJsEmyXfo7uFgz6NBkAK4zmO+C4g0gCgiuuq
rHIG69y+YCYxsPVZvEbmBks=
=kgSx
-----END PGP SIGNATURE-----
More information about the Enterprise-watch-list
mailing list