Skip to content

KDE 3.0.5b Info Page

Wednesday, 9 April 2003

KDE 3.0.5b was released on April 9th, 2003 in response to the PS/PDF handling vulnerability.

Security Issues

Please report possible problems to security@kde.org.

  • The telnet, rlogin, ssh and mailto URI handlers in KDE do not check for '-' at the beginning of the hostname passed, which makes it possible to pass an option to the programs started by the handlers. Read the detailed advisory. All versions of KDE up to KDE 3.2.2 are affected.

FAQ

See the KDE FAQ for any specific questions you may have. Questions about Konqueror should be directed to the Konqueror FAQ and sound related questions are answered in the FAQ of the aRts Project

Download and Installation

Source code

LocationSizeMD5 Sum
arts-1.11001KBf0459975c08bcc6456a4d88d6f224e80
kdeaddons-3.0.5b913KB3aeab87659d418821194ef45f76302ab
kdeadmin-3.0.5b1.3MB2adcfec8bbca78dd40297fc184fd3f28
kdeartwork-3.0.5b11MBba42fc6bc6e61223cbaee0168bc72f17
kdebase-3.0.5b13MB608f457dd8157c69bf855092e516afa2
kdebindings-3.0.5b4.8MB3b2be6852011e17afd09d5f2b0bc0692
kdeedu-3.0.5b8.7MB2903e02601c5b8ac8eaf4d52757da03c
kdegames-3.0.5b7.0MBd436bd70d9eefd57ed176268e3b1ab00
kdegraphics-3.0.5b2.6MBe9e894e173a144b0ba562fd3065a6c20
kdelibs-3.0.5b7.3MB50b483665bc868f2dbc53aaaa3c2f302
kdemultimedia-3.0.5b5.5MBae4178f6c2eead819174f28addd0c684
kdenetwork-3.0.5b3.7MB56735b0933c28e4b6db41af72f36c703
kdepim-3.0.5b3.1MB8899db7bccc7369144a8cd3e4ef21f66
kdesdk-3.0.5b1.8MB9c6eaf26033b16de618a5cca9f41fdfa
kdetoys-3.0.5b1.4MBc548485e7551937df14a60d8c2dab1b4
kdeutils-3.0.5b1.5MB4e3b780ed2dc9724214e1c3dcc8d7d4c

These source packages have been digitally signed with GnuPG using the KDE Archives PGP Key (available from the KDE Signature page or public key servers).

The translation package has been split into individual language packages so you can download only the translations you need.

Binary packages

Binary packages can be found under http://download.kde.org/stable/3.0.5b/ or in the equivalent directory at one of the KDE FTP mirrors.

Additional binary packages might become available in the coming weeks, as well as updates to the current packages.

Updates

Security Issues

Please report possible problems to security@kde.org.

Bugs

This is a list of grave bugs and common pitfalls surfacing after the release date:

  • A HTTP authentication credentials leak via the a "Referrer" was discovered by George Staikos in Konqueror. If the HTTP authentication credentials were part of the URL they would be possibly sent in the referer header to a 3rd party web site. Read the detailed advisory. KDE 3.1.3 and newer are not vulnerable.

Developer Info

If you need help porting your application to KDE 3.x see the porting guide or subscribe to the KDE Devel Mailinglist to ask specific questions about porting your applications.

There is also info on the architecture and the programming interface of KDE 3.0.