---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Mandriva update for kdebase SECUNIA ADVISORY ID: SA26977 VERIFY ADVISORY: http://secunia.com/advisories/26977/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: Local system OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for kdebase. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. For more information: SA26894 SOLUTION: Apply updated packages. -- Mandriva Linux 2007 -- ed95f0866adcc9061a1be7cc2f71732a 2007.0/i586/kdebase-3.5.4-35.5mdv2007.0.i586.rpm 20fbdefc98bb62fae257342950774cd8 2007.0/i586/kdebase-common-3.5.4-35.5mdv2007.0.i586.rpm 9156ef220fd56e3a30870c488402eba3 2007.0/i586/kdebase-kate-3.5.4-35.5mdv2007.0.i586.rpm ca1197ce8ec9810f802c8c715faf249c 2007.0/i586/kdebase-kdeprintfax-3.5.4-35.5mdv2007.0.i586.rpm 86b4fb370db6503dd493682a0554b053 2007.0/i586/kdebase-kdm-3.5.4-35.5mdv2007.0.i586.rpm 35e68ba7b6e36bc8067f1fa3f454e4ff 2007.0/i586/kdebase-kmenuedit-3.5.4-35.5mdv2007.0.i586.rpm 74fd4ca948278dfcf6fc6877c68ce919 2007.0/i586/kdebase-konsole-3.5.4-35.5mdv2007.0.i586.rpm 17b6947e93cdaa7e6729a22f7a871bda 2007.0/i586/kdebase-nsplugins-3.5.4-35.5mdv2007.0.i586.rpm 47cee3a1165a9dd5dbbd0c0140b44057 2007.0/i586/kdebase-progs-3.5.4-35.5mdv2007.0.i586.rpm ddc5c70cab92ee7d60dd93fdec81973d 2007.0/i586/libkdebase4-3.5.4-35.5mdv2007.0.i586.rpm cf92676be0c9794d498d79a6eeebd294 2007.0/i586/libkdebase4-devel-3.5.4-35.5mdv2007.0.i586.rpm e384a2390808db44e10f8c9b2c98b957 2007.0/i586/libkdebase4-kate-3.5.4-35.5mdv2007.0.i586.rpm 2d3f673d5a57ed2af65715df9562ef6b 2007.0/i586/libkdebase4-kate-devel-3.5.4-35.5mdv2007.0.i586.rpm 6f751d5864a2f8b02d2fcb457baa389c 2007.0/i586/libkdebase4-kmenuedit-3.5.4-35.5mdv2007.0.i586.rpm 826a238be86d001596bb496809bbc97f 2007.0/i586/libkdebase4-konsole-3.5.4-35.5mdv2007.0.i586.rpm 99a81ef71314ea78da17d61dff80573c 2007.0/SRPMS/kdebase-3.5.4-35.5mdv2007.0.src.rpm -- Mandriva Linux 2007/X86_64 -- 44790cfa5b08b21e8576af4ff3d060d0 2007.0/x86_64/kdebase-3.5.4-35.5mdv2007.0.x86_64.rpm 357266037580782f76eadcb43ba7534f 2007.0/x86_64/kdebase-common-3.5.4-35.5mdv2007.0.x86_64.rpm bcc05ade84a36836d1b9b572637fccfb 2007.0/x86_64/kdebase-kate-3.5.4-35.5mdv2007.0.x86_64.rpm 1891d558ff46fec886f2d6a3e31bc297 2007.0/x86_64/kdebase-kdeprintfax-3.5.4-35.5mdv2007.0.x86_64.rpm fd1ca3c7ded0401852da46e09432a758 2007.0/x86_64/kdebase-kdm-3.5.4-35.5mdv2007.0.x86_64.rpm 64c2bd60c19df0ea5a18176d7b59a5a6 2007.0/x86_64/kdebase-kmenuedit-3.5.4-35.5mdv2007.0.x86_64.rpm b4179a132b796afebfd3ffa7d07aca3f 2007.0/x86_64/kdebase-konsole-3.5.4-35.5mdv2007.0.x86_64.rpm 87928d82fc35349e692207f12947ddfd 2007.0/x86_64/kdebase-nsplugins-3.5.4-35.5mdv2007.0.x86_64.rpm 9ab48e9c1003415981f2b7b53ffb6873 2007.0/x86_64/kdebase-progs-3.5.4-35.5mdv2007.0.x86_64.rpm da0f202940d03b8bc49accdb2a51b060 2007.0/x86_64/lib64kdebase4-3.5.4-35.5mdv2007.0.x86_64.rpm d9998a998d77cdac73729787beea7550 2007.0/x86_64/lib64kdebase4-devel-3.5.4-35.5mdv2007.0.x86_64.rpm 227442038377db2587454c6a1a5ec462 2007.0/x86_64/lib64kdebase4-kate-3.5.4-35.5mdv2007.0.x86_64.rpm 11303b19dc729c00cdb47e8b873787ec 2007.0/x86_64/lib64kdebase4-kate-devel-3.5.4-35.5mdv2007.0.x86_64.rpm 178acb8477c40e6d225825d23e7745bc 2007.0/x86_64/lib64kdebase4-kmenuedit-3.5.4-35.5mdv2007.0.x86_64.rpm 090a8fd1c95df07eb5f41335da0746a6 2007.0/x86_64/lib64kdebase4-konsole-3.5.4-35.5mdv2007.0.x86_64.rpm 99a81ef71314ea78da17d61dff80573c 2007.0/SRPMS/kdebase-3.5.4-35.5mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2007:190 OTHER REFERENCES: SA26894: http://secunia.com/advisories/26894/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------