RedHat: Low: kdbg security update

    Date02 Jun 2005
    CategoryRed Hat
    7625
    Posted ByJoe Shakespeare
    An updated kdbg package that fixes a minor security issue is now available for Red Hat Enterprise Linux 2.1. This update has been rated as having low security impact by the Red Hat Security Response Team.
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Low: kdbg security update
    Advisory ID:       RHSA-2005:416-01
    Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-416.html
    Issue date:        2005-06-02
    Updated on:        2005-06-02
    Product:           Red Hat Enterprise Linux
    CVE Names:         CAN-2003-0644
    - ---------------------------------------------------------------------
    
    1. Summary:
    
    An updated kdbg package that fixes a minor security issue is now available
    for Red Hat Enterprise Linux 2.1.
    
    This update has been rated as having low security impact by the Red Hat
    Security Response Team.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
    Red Hat Linux Advanced Workstation 2.1 - ia64
    Red Hat Enterprise Linux ES version 2.1 - i386
    Red Hat Enterprise Linux WS version 2.1 - i386
    
    3. Problem description:
    
    Kdbg is a K Desktop Environment (KDE) GUI for gdb, the GNU debugger.
    
    Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file.
    If a program is located in a world-writable location, it is possible for a
    local user to inject malicious commands.  These commands are then executed
    with the permission of any user that runs Kdbg.  The Common Vulnerabilities
    and Exposures project assigned the name CAN-2003-0644 to this issue.
    
    Users of Kdbg should upgrade to this updated package, which contains a
    backported patch to correct this issue.
    
    4. Solution:
    
    Before applying this update, make sure that all previously-released
    errata relevant to your system have been applied.  Use Red Hat
    Network to download and update your packages.  To launch the Red Hat
    Update Agent, use the following command:
    
        up2date
    
    For information on how to install packages manually, refer to the
    following Web page for the System Administration or Customization
    guide specific to your system:
    
        http://www.redhat.com/docs/manuals/enterprise/
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/):
    
    155917 - CAN-2003-0644 kdbg arbitrary command execution
    
    
    6. RPMs required:
    
    Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/kdbg-1.2.1-7.src.rpm
    cf1154f5fb61b845d9293bb78fefb959  kdbg-1.2.1-7.src.rpm
    
    i386:
    42febfeae98126086022d45f5ac91815  kdbg-1.2.1-7.i386.rpm
    
    ia64:
    3b96bfde38afa4aa861cfce88288a32f  kdbg-1.2.1-7.ia64.rpm
    
    Red Hat Linux Advanced Workstation 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/kdbg-1.2.1-7.src.rpm
    cf1154f5fb61b845d9293bb78fefb959  kdbg-1.2.1-7.src.rpm
    
    ia64:
    3b96bfde38afa4aa861cfce88288a32f  kdbg-1.2.1-7.ia64.rpm
    
    Red Hat Enterprise Linux ES version 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/kdbg-1.2.1-7.src.rpm
    cf1154f5fb61b845d9293bb78fefb959  kdbg-1.2.1-7.src.rpm
    
    i386:
    42febfeae98126086022d45f5ac91815  kdbg-1.2.1-7.i386.rpm
    
    Red Hat Enterprise Linux WS version 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/kdbg-1.2.1-7.src.rpm
    cf1154f5fb61b845d9293bb78fefb959  kdbg-1.2.1-7.src.rpm
    
    i386:
    42febfeae98126086022d45f5ac91815  kdbg-1.2.1-7.i386.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and 
    details on how to verify the signature are available from
    https://www.redhat.com/security/team/key/#package
    
    7. References:
    
    http://lists.kde.org/?l=kde-announce&m=106296509815092&w=2
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0644
    
    8. Contact:
    
    The Red Hat security contact is .  More contact
    details at https://www.redhat.com/security/team/contact/
    
    Copyright 2005 Red Hat, Inc.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.76,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":12.93,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.31,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.