[KDE Security Advisory]: Kate backup file permission leak

From: Dirk Mueller (mueller_at_kde.org)
Date: 07/18/05

  • Next message: Javor Ninov: "Re: VoIP-Phones: Weakness in proccessing SIP-Notify-Messages"
    To: kde-announce@kde.org
    Date: Mon, 18 Jul 2005 17:19:37 +0200
    
    
    

    KDE Security Advisory: Kate backup file permission leak
    Original Release Date: 2005-07-18
    URL: http://www.kde.org/info/security/advisory-20050718-1.txt

    0. References
            CVE CAN-2005-1920
            https://bugs.kde.org/show_bug.cgi?id=103331

    1. Systems affected:

            All maintained versions of Kate and Kwrite as shipped with
            KDE 3.2.x up to including 3.4.0. KDE 3.1.x and older and
            KDE 3.4.1 and newer are not affected.

    2. Overview:

            Kate / Kwrite create a file backup before saving a modified
            file. These backup files are created with default permissions,
            even if the original file had more strict permissions set.

    3. Impact:

            Depending on the system security settings, backup files
            might be readable by other users. Kate / Kwrite are
            network transparent applications and therefore this
            vulnerability might not be restricted to local users.

    4. Solution:

            Source code patches have been made available which fix these
            vulnerabilities. Contact your OS vendor / binary package provider
            for information about how to obtain updated binary packages.

    5. Patch:

            A patch for KDE 3.4.0 is available from
            ftp://ftp.kde.org/pub/kde/security_patches :

            50f7bc6d8cf4b7aaa65e4e8062fc46c9 post-3.4.0-kdelibs-kate.diff

            A patch for KDE 3.3.x is available from
            ftp://ftp.kde.org/pub/kde/security_patches :

            138c3252883171d55ec24ed0318950fd post-3.3.2-kdelibs-kate.diff

            A patch for KDE 3.2.x is available from
            ftp://ftp.kde.org/pub/kde/security_patches :

            56667c05f545e8c9711c35bf78497bfd post-3.2.3-kdelibs-kate.diff

    -- 
    Dirk//\
    
    



  • Next message: Javor Ninov: "Re: VoIP-Phones: Weakness in proccessing SIP-Notify-Messages"

    Relevant Pages

    • Re: [PATCH][RFC][resend] potential NULL pointer deref in XFS on failed mount
      ... The patch still applies cleanly to ... > buftarg, then we will leak a reference to both the rtdev and logdev, ... > To remove the bdev references we may have gained earlier. ...
      (Linux-Kernel)
    • kbuild:
      ... confident that keeping the checks in modpost is good. ... In a follow-up mail I will post the result of a run with this patch. ... Section mismatch is identified as references to .init* ...
      (Linux-Kernel)
    • 2.6.19-rc6: known regressions (v4)
      ... If you find your name in the Cc header, you are either submitter of one ... References: http://lkml.org/lkml/2006/11/20/233 ... commit f72fa707604c015a6625e80f269506032d5430dc ... Patch: http://lkml.org/lkml/2006/11/20/320 ...
      (Linux-Kernel)
    • 2.6.19-rc6: known regressions
      ... This email lists some known regressions in 2.6.19-rc6 compared to 2.6.18 ... If you find your name in the Cc header, you are either submitter of one ... References: http://lkml.org/lkml/2006/11/15/12 ... Patch: http://lkml.org/lkml/2006/11/16/36 ...
      (Linux-Kernel)
    • Re: Random Compiler Errors, again
      ... > Thanks Charles - I'll give it a try. ... Did they produce a patch to fix our ... >>I submitted a support request via their web site. ... >> from dll references to project references. ...
      (microsoft.public.dotnet.general)