Date: Fri, 29 Mar 2002 15:21:17 -0800
From: [email protected]
To: [email protected], [email protected],
Subject: Security Update: [CSSA-2002-005.0] Linux - LD_LIBRARY_PATH problem in KDE sessions
--PNTmBPCT7hxwcZjr
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
To: [email protected][email protected] security-alerts@li=
nuxsecurity.com
___________________________________________________________________________=
___
Caldera International, Inc. Security Advisory
Subject: Linux - LD_LIBRARY_PATH problem in KDE sessions
Advisory number: CSSA-2002-005.0
Issue date: 2002, February 05
Cross reference:
___________________________________________________________________________=
___
1. Problem Description
In OpenLinux 3.1.1, the startkde script will set the LD_LIBRARY_PATH
environment variable to " /opt/kde2/lib:" which includes the current
working directory in the library search path. This exposes users to
shared library attacks.
2. Vulnerable Versions
System Package
-----------------------------------------------------------
OpenLinux 2.3 not vulnerable =20
=20
OpenLinux eServer 2.3.1 not vulnerable =20
and OpenLinux eBuilder =20
=20
OpenLinux eDesktop 2.4 not vulnerable =20
=20
OpenLinux Server 3.1 not vulnerable =20
=20
OpenLinux Workstation 3.1 not vulnerable =20
=20
OpenLinux 3.1 IA64 not vulnerable =20
=20
OpenLinux Server 3.1.1 All packages previous to =20
kdeconfig-20011203-2 =20
=20
OpenLinux Workstation All packages previous to =20
3.1.1 kdeconfig-20011203-2 =20
=20
3. Solution
Workaround
none
The proper solution is to upgrade to the latest packages.
4. OpenLinux 2.3
not vulnerable
5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0
not vulnerable
6. OpenLinux eDesktop 2.4
not vulnerable
7. OpenLinux 3.1 Server
not vulnerable
8. OpenLinux 3.1 Workstation
not vulnerable
9. OpenLinux 3.1 IA64
not vulnerable
10. OpenLinux 3.1.1 Server
10.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS
The corresponding source code package can be found at:
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRP=
MS
10.2 Verification
080998dc9e5fc03b7b20f3644ae8b31b RPMS/kdeconfig-20011203-2.i386.rpm
c7c9874846b6ca77678274c759ffce77 SRPMS/kdeconfig-20011203-2.src.rpm
=20
10.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fvh kdeconfig-20011203-2.i386.rpm
=20
11. OpenLinux 3.1.1 Workstation
11.1 Location of Fixed Packages
The upgrade packages can be found on Caldera's FTP site at:
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/curren=
t/RPMS
The corresponding source code package can be found at:
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/curren=
t/SRPMS
11.2 Verification
080998dc9e5fc03b7b20f3644ae8b31b RPMS/kdeconfig-20011203-2.i386.rpm
c7c9874846b6ca77678274c759ffce77 SRPMS/kdeconfig-20011203-2.src.rpm
=20
11.3 Installing Fixed Packages
Upgrade the affected packages with the following commands:
rpm -Fvh kdeconfig-20011203-2.i386.rpm
=20
12. References
This and other Caldera security resources are located at:
http://www.caldera.com/support/security/index.html
13. Disclaimer
Caldera International, Inc. is not responsible for the misuse of
any of the information we provide on this website and/or through our
security advisories. Our advisories are a service to our customers
intended to promote secure installation and use of Caldera OpenLinux.
___________________________________________________________________________=
___
--PNTmBPCT7hxwcZjr
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjyk9uwACgkQbluZssSXDTGuDgCg+XKYk9PD7pfsYnxbXLoEMjLS
9YgAoPYYd1OfnCjaX19cAjHNcT90tIh4
=RrqS
-----END PGP SIGNATURE-----
--PNTmBPCT7hxwcZjr--