The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Security Update: [CSSA-2002-005.0] Linux - LD_LIBRARY_PATH problem in KDE sessions


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Fri, 29 Mar 2002 15:21:17 -0800
From: security@caldera.com
To: bugtraq@securityfocus.com, announce@lists.caldera.com,
Subject: Security Update: [CSSA-2002-005.0] Linux - LD_LIBRARY_PATH problem in KDE sessions

--PNTmBPCT7hxwcZjr
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@li=
nuxsecurity.com

___________________________________________________________________________=
___
		   Caldera International, Inc.  Security Advisory

Subject:		Linux - LD_LIBRARY_PATH problem in KDE sessions
Advisory number: 	CSSA-2002-005.0
Issue date: 		2002, February 05
Cross reference:
___________________________________________________________________________=
___


1. Problem Description

   In OpenLinux 3.1.1, the startkde script will set the LD_LIBRARY_PATH
   environment variable to " /opt/kde2/lib:" which includes the current
   working directory in the library search path. This exposes users to
   shared library attacks.


2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux 2.3                 not vulnerable               =20
  =20
   OpenLinux eServer 2.3.1       not vulnerable               =20
   and OpenLinux eBuilder                                     =20
  =20
   OpenLinux eDesktop 2.4        not vulnerable               =20
  =20
   OpenLinux Server 3.1          not vulnerable               =20
  =20
   OpenLinux Workstation 3.1     not vulnerable               =20
  =20
   OpenLinux 3.1 IA64            not vulnerable               =20
  =20
   OpenLinux Server 3.1.1        All packages previous to     =20
                                 kdeconfig-20011203-2         =20
  =20
   OpenLinux Workstation         All packages previous to     =20
   3.1.1                         kdeconfig-20011203-2         =20
  =20


3. Solution

   Workaround

     none

   The proper solution is to upgrade to the latest packages.

4. OpenLinux 2.3

    not vulnerable

5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0

    not vulnerable

6. OpenLinux eDesktop 2.4

    not vulnerable

7. OpenLinux 3.1 Server

    not vulnerable

8. OpenLinux 3.1 Workstation

    not vulnerable

9. OpenLinux 3.1 IA64

    not vulnerable

10. OpenLinux 3.1.1 Server

    10.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRP=
MS

   10.2 Verification

       080998dc9e5fc03b7b20f3644ae8b31b  RPMS/kdeconfig-20011203-2.i386.rpm
       c7c9874846b6ca77678274c759ffce77  SRPMS/kdeconfig-20011203-2.src.rpm
      =20

   10.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh kdeconfig-20011203-2.i386.rpm
        =20

11. OpenLinux 3.1.1 Workstation

    11.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/curren=
t/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/curren=
t/SRPMS

   11.2 Verification

       080998dc9e5fc03b7b20f3644ae8b31b  RPMS/kdeconfig-20011203-2.i386.rpm
       c7c9874846b6ca77678274c759ffce77  SRPMS/kdeconfig-20011203-2.src.rpm
      =20

   11.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh kdeconfig-20011203-2.i386.rpm
        =20


12. References

   This and other Caldera security resources are located at:

   http://www.caldera.com/support/security/index.html


13. Disclaimer

   Caldera International, Inc. is not responsible for the misuse of
   any of the information we provide on this website and/or through our
   security advisories. Our advisories are a service to our customers
   intended to promote secure installation and use of Caldera OpenLinux.
___________________________________________________________________________=
___

--PNTmBPCT7hxwcZjr
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjyk9uwACgkQbluZssSXDTGuDgCg+XKYk9PD7pfsYnxbXLoEMjLS
9YgAoPYYd1OfnCjaX19cAjHNcT90tIh4
=RrqS
-----END PGP SIGNATURE-----

--PNTmBPCT7hxwcZjr--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру