Skip to navigation

Security Advisory kdbg security update

Advisory: RHSA-2005:416-04
Type: Security Advisory
Severity: Low
Issued on: 2005-06-02
Last updated on: 2005-06-02
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2003-0644

Details

An updated kdbg package that fixes a minor security issue is now available
for Red Hat Enterprise Linux 2.1.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

Kdbg is a K Desktop Environment (KDE) GUI for gdb, the GNU debugger.

Kdbg 1.1.0 through 1.2.8 does not check permissions of the .kdbgrc file.
If a program is located in a world-writable location, it is possible for a
local user to inject malicious commands. These commands are then executed
with the permission of any user that runs Kdbg. The Common Vulnerabilities
and Exposures project assigned the name CAN-2003-0644 to this issue.

Users of Kdbg should upgrade to this updated package, which contains a
backported patch to correct this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/SRPMS/kdbg-1.2.1-7.src.rpm
Missing file
    MD5: cf1154f5fb61b845d9293bb78fefb959
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/i386/kdbg-1.2.1-7.i386.rpm
Missing file
    MD5: 42febfeae98126086022d45f5ac91815
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/ia64/kdbg-1.2.1-7.ia64.rpm
Missing file
    MD5: 3b96bfde38afa4aa861cfce88288a32f
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/SRPMS/kdbg-1.2.1-7.src.rpm
Missing file
    MD5: cf1154f5fb61b845d9293bb78fefb959
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/i386/kdbg-1.2.1-7.i386.rpm
Missing file
    MD5: 42febfeae98126086022d45f5ac91815
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/SRPMS/kdbg-1.2.1-7.src.rpm
Missing file
    MD5: cf1154f5fb61b845d9293bb78fefb959
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/i386/kdbg-1.2.1-7.i386.rpm
Missing file
    MD5: 42febfeae98126086022d45f5ac91815
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/SRPMS/kdbg-1.2.1-7.src.rpm
Missing file
    MD5: cf1154f5fb61b845d9293bb78fefb959
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/kdbg/1.2.1-7/ia64/kdbg-1.2.1-7.ia64.rpm
Missing file
    MD5: 3b96bfde38afa4aa861cfce88288a32f
 

Bugs fixed (see bugzilla for more information)

155917 - CAN-2003-0644 kdbg arbitrary command execution


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/