Bug#285126: CAN-2004-1171: plain text password exposure

2004-12-11 Thread Adeodato Simó
tag 285126 sarge
stop here

* Joey Hess [Fri, 10 Dec 2004 14:45:15 -0500]:
> Package: kdelibs, kdebase
> Version: 3.3.2
> Tags: security, patch
> Severity: serious

> CAN-2004-1171 is about a security hole in KDE that allows for possible
> passoword leakage:

  hi,

kdelibs 3.3.1-2 and kdebase 3.3.1-3 have been uploaded to sid,
fixing the problem.

there is no 3.2 upload to t-p-u planned, since the KDE 3.3 testing
transition has now RMs' approval and we're putting our efforts in it
happening soon.

thanks,

-- 
Adeodato Simó
EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621
 
The pure and simple truth is rarely pure and never simple.
-- Oscar Wilde




Processed: Re: Bug#285126: CAN-2004-1171: plain text password exposure

2004-12-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

> tag 285126 sarge
Bug#285126: CAN-2004-1171: plain text password exposure
Tags were: patch security
Tags added: sarge

> stop here
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)



Bug#285126: CAN-2004-1171: plain text password exposure

2004-12-10 Thread Adeodato Simó
* Joey Hess [Fri, 10 Dec 2004 17:38:29 -0500]:
> Adeodato Simó wrote:
> >   I've prepared kdelibs and kdebase uploads for this. I'm now looking
> >   for somebody to upload them for me.

> Are you one of the normal KDE maintainers? (Sorry, I'm not up-to-date on
> KDE maintenance.) If so, I can do the sponsoring.

  let's say I'm becoming an habitual. as for sponsoring, I just talked
  to Riku Voipio and he'll be reviewing and uploading tomorrow, is that
  ok with you?

  in any case, thanks for your offer.

-- 
Adeodato Simó
EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621
Listening to: Oasis - Hello
 
Everything you read in newspapers is absolutely true, except for that
rare story of which you happen to have first-hand knowledge.
-- Erwin Knoll




Bug#285126: CAN-2004-1171: plain text password exposure

2004-12-10 Thread Joey Hess
Adeodato Simó wrote:
>   I've prepared kdelibs and kdebase uploads for this. I'm now looking
>   for somebody to upload them for me.

Are you one of the normal KDE maintainers? (Sorry, I'm not up-to-date on
KDE maintenance.) If so, I can do the sponsoring.

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#285126: CAN-2004-1171: plain text password exposure

2004-12-10 Thread Adeodato Simó
* Joey Hess [Fri, 10 Dec 2004 14:45:15 -0500]:
> Package: kdelibs, kdebase
> Version: 3.3.2
> Tags: security, patch
> Severity: serious

> CAN-2004-1171 is about a security hole in KDE that allows for possible
> passoword leakage:

  I've prepared kdelibs and kdebase uploads for this. I'm now looking
  for somebody to upload them for me.

-- 
Adeodato Simó
EM: asp16 [ykwim] alu.ua.es | PK: DA6AE621
Listening to: The Beatles - Get back
 
When it is not necessary to make a decision, it is necessary not to make
a decision.




Bug#285126: CAN-2004-1171: plain text password exposure

2004-12-10 Thread Joey Hess
Package: kdelibs, kdebase
Version: 3.3.2
Tags: security, patch
Severity: serious

CAN-2004-1171 is about a security hole in KDE that allows for possible
passoword leakage:

  KDE 3.2.x and 3.3.0 through 3.3.2, when saving credentials that are (1)
  manually entered by the user or (2) created by the SMB protocol handler, 
stores
  those credentials for in plaintext in the user's .desktop file, which may be
  created with world-readable permissions, which could allow local users to
  obtain usernames and passwords for remote resources such as SMB shares.

Note that this will need to be fixed in both the version in unstable
and the older version in testing via t-p-u. This page has details of the
hole and links to patches for all recent versions of KDE:

http://marc.theaimsgroup.com/?l=bugtraq&m=110261063201488&w=2

-- 
see shy jo


signature.asc
Description: Digital signature