USN-3042-1: KDE-Libs vulnerability
26 July 2016
KDE-Libs could be made to overwrite files.
Releases
Packages
- kde4libs - KDE 4 core applications and libraries
Details
Andreas Cord-Landwehr discovered that KDE-Libs incorrectly handled
extracting certain archives. If a user were tricked into extracting a
specially-crafted archive, a remote attacker could use this issue to
overwrite arbitrary files out of the extraction directory.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10
Ubuntu 14.04
Ubuntu 12.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-4100-1: libkio5, libkdecore5, libkf5config-data, libkf5configgui5, libkrossui4, libkemoticons4, libkf5config-dev-bin, libkmediaplayer4, libsolid4, kdoctools, kde4libs, libkf5config-doc, kconfig, libkutils4, libkfile4, libkhtml5, libkparts4, libktexteditor4, kdelibs5-dev, libkdeclarative5, kdelibs-bin, libknewstuff3-4, libknotifyconfig4, libplasma3, libkcmutils4, libkf5config-dev, libkntlm4, libkjsapi4, libkdewebkit5, libkdnssd4, libkdeui5, kdelibs5-data, libkdesu5, libkunitconversion4, libkf5configcore5, libkjsembed4, libkimproxy4, libkde3support4, libkpty4, libkf5config-bin, libthreadweaver4, libkidletime4, libkf5config-bin-dev, libknewstuff2-4, libkprintutils4, kdelibs5-plugins, libkrosscore4