KDE 3.2.1 Info Page
KDE 3.2.1 was released on March 9th, 2004. Read the official announcement.
Security Issues
Please report possible problems to security@kde.org.
Patches for the issues mentioned below are available from ftp://ftp.kde.org/pub/kde/security_patches unless stated otherwise.
- The telnet, rlogin, ssh and mailto URI handlers in KDE do not check for '-' at the beginning of the hostname
passed, which makes it possible to pass an option to the programs started by the handlers.
Read the detailed advisory. All versions of KDE up to and including KDE 3.2.2 are affected. - KDE fails to ensure the integrity of certain symlinks. This can be abused by a local
attacker to create or truncate arbitrary files or to prevent KDE applications
from functioning correctly.
Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected. - KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary
files are used for authentication related purposes this can potentially allow a local
attacker to compromise the account of any user which runs a KDE application.
Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected. - The Konqueror webbrowser allows websites to load webpages into
a frame of any other frame-based webpage that the user may have open.
Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected. - Konqueror allows websites to set cookies for certain country specific secondary top level domains.
(Cross-domain cookie injection)
Read the detailed advisory. All versions of KDE up to and including KDE 3.2.3 are affected. - KPDF contains multiple integer overflow and integer arithmetic flaws that may make it possible
to execute arbitrary code on the client machine via remotely supplied PDF files.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected. - KDE may unexpectedly expose user provided passwords in certain cases, especially passwords for
SMB shares.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected. - KFax contains several vulnerabilities that may cause specially crafted fax files to trigger
buffer overflows and execute arbitrary code.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
No source patches are available for this problem, users are advised to either remove KFax or to upgrade to KDE 3.3.2. - The Konqueror webbrowser allows websites to load webpages into
a window or tab currently used by another website.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected. - Two flaws in the Konqueror webbrowser make it possible to by pass
the sandbox environment which is used to run Java-applets.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected. - kpdf contains a buffer overflow in its xpdf-based code which can be triggered
by a specially crafted pdf file.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected. - ftp kioslave contains a vulnerability which allows to inject arbitrary ftp or
smtp commands.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected. - kpdf contains a buffer overflow in its xpdf-based code which can be triggered
by a specially crafted pdf file.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected. - A local user can lock up the dcopserver of arbitrary other users
on the same machine by stalling the DCOP authentication process.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected. - International Domain Name (IDN) support in Konqueror/KDE makes
KDE vulnerable to a phishing technique known as a Homograph attack.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected. - The dcopidlng script is vulnerable to symlink attacks, potentially
allowing a local user to overwrite arbitrary files of a user when
the script is run on behalf of that user. This only affects users
who compile KDE or KDE applications themselves.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.2 are affected. - The Kate KPart (used by the applications kate and kwrite, possibly others)
generates a backup file with default permissions upon saving. Depending
on the setup, this could cause file content leak to local and remote
(due to network transparency) users.
Read the detailed advisory. KDE 3.2.x up to including KDE 3.4.0 are affected. - The langen2kvtml script (included in kdeedu/kvoctrain) contains
multiple temp file generation vulnerabilities.
Read the detailed advisory. KDE 3.0.x up to including KDE 3.4.2 are affected. - The kcheckpass utility contains on certain platforms a local
root vulnerability.
Read the detailed advisory. KDE 3.2.0 up to including KDE 3.4.2 are affected. - kpdf contains several buffer overflows in its xpdf-based code which can be triggered
by a specially crafted pdf file.
Read the detailed advisory. All versions of KDE up to and including KDE 3.5.0 are affected. - kjs contains a heap based buffer overflow when decoding certain malcrafted utf8
uri sequences.
Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.0 are affected. - KDM contains a symlink attack vulnerability that allows a normal
user to read files from other users including root.
Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.2 are affected.
Bugs
Please check the bug database before filing any bug reports. Also check for possible updates on this page that might describe or fix your problem.
FAQ
See the KDE FAQ for any specific questions you may have. Questions about Konqueror should be directed to the Konqueror FAQ and sound related questions are answered in the FAQ of the aRts Project
Download and Installation
Library Requirements. KDE 3.2 requires or benefits from the given list of libraries, most of which should be already installed on your system or available from your OS CD or your vendor's website.
The complete source code for KDE 3.2.1 is available for download:
Location | Size | MD5 Sum |
---|---|---|
arts-1.2.1 | 1020kB | 84877632917893438c629803e7b004f3 |
kde-i18n-3.2.1 | 165MB | 3e076e6074df8a5abb9bdb6542c017bc |
kdeaccessibility-3.2.1 | 1.7MB | 3a6215b9b3b7a1d7bb6e51863066a61e |
kdeaddons-3.2.1 | 1.8MB | c73c1777d3f5c25f46cd782fcca9fc35 |
kdeadmin-3.2.1 | 2.0MB | 1ff46933b955cb4bc71cd533c6f730d1 |
kdeartwork-3.2.1 | 16MB | 8c539b4ba4550e8355df03992c36cf58 |
kdebase-3.2.1 | 16MB | 3a3d89b0b49dbb1eaa9e71c83019bbef |
kdebindings-3.2.1 | 10MB | d9bd456cb3896bf652a21c66a8f6260f |
kdeedu-3.2.1 | 21MB | e6eea40d3e26426e34f02bba8ffb72e2 |
kdegames-3.2.1 | 9.2MB | 60b05fa22dfc0ec812ca88dacb0249aa |
kdegraphics-3.2.1 | 5.9MB | 5a1676b46efdd64be2f9e9604f04b176 |
kdelibs-3.2.1 | 12MB | 50ae60072c1fc4ae4e41694bc2325dcb |
kdemultimedia-3.2.1 | 5.2MB | 6e03faa44ff7fdf60fd2fef0d23d5c43 |
kdenetwork-3.2.1 | 6.4MB | c9135b09191624490590a014da4bfb3d |
kdepim-3.2.1 | 7.9MB | 362bec23869328a85845e0501020c938 |
kdesdk-3.2.1 | 4.2MB | f52a69718705b32f0068fb605b604b45 |
kdetoys-3.2.1 | 2.8MB | 217c8c2ddb4040abe13a719d6b18e807 |
kdeutils-3.2.1 | 2.9MB | 152030a2912609997d73d7af0bb96d52 |
kdevelop-3.0.2 | 5.7MB | 1c7df5b7abfc1981922f8a681ab93bb0 |
quanta-3.2.1 | 3.9MB | 37990f042bdc48b6d0e9e714549ad3d7 |
The Konstruct build toolset can help you downloading and installing these tarballs.
Some Linux/UNIX OS vendors have kindly provided binary packages of KDE 3.2 for some versions of their distribution, and in other cases community volunteers have done so. Some of these binary packages are available for free download from KDE's http or FTP mirrors.
At the time of this release, pre-compiled packages are available for:
- ASP Linux
:
- Icon and Language packages (all versions and architectures)
- 9.2: Intel i386
- Red Hat
:
- Logo and Language packages (all versions and architectures)
- Fedora: Intel i386
- Slackware (Unofficial contribution):
- Language packages (all versions and architectures)
- 9.1: Intel i486
- SuSE Linux
(README)
:
- Language packages (all versions and architectures)
- 9.0: Intel i586 and AMD x86-64
- 8.2: Intel i586
- 8.1: Intel i586
Additional binary packages might become available in the coming weeks, as well as updates to the current packages.
Developer Info
If you need help porting your application to KDE 3.x see the porting guide or subscribe to the KDE Devel Mailinglist to ask specific questions about porting your applications.
There is also info on the architecture and the programming interface of KDE 3.2.