the following is a excerpt from
-----BEGIN PGP SIGNED MESSAGE-----
KDE Security Advisory: Konqueror Cross-Domain Cookie Injection
Original Release Date: 2004-08-23
1. Systems affected:
KDE versions up to KDE 3.2.3 inclusive. KDE 3.3 is not affected.
WESTPOINT internet reconnaissance services alerted the KDE
security team that the KDE web browser Konqueror allows websites
to set cookies for certain country specific secondary top level
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2004-0746 to this issue.
Web sites operating under the affected domains can set HTTP
cookies in such a way that the Konqueror web browser will send them
to all other web sites operating under the same domain.
A malicious website can use this as part of a session fixation
attack. See e.g. http://www.acros.si/papers/session_fixation.pdf
Affected are all country specific secondary top level domains that
use more than 2 characters in the secondary part of the domain name
and that use a secondary part other than com, net, mil, org, gov,
edu or int. Examples of affected domains are .ltd.uk, .plc.uk and
It should be noted that popular domains such as .co.uk, .co.in
and .com are NOT affected.
Source code patches have been made available which fix these
vulnerabilities. Contact your OS vendor / binary package provider
for information about how to obtain updated binary packages.
Patches for KDE 3.0.5b are available from
Patches for KDE 3.1.5 are available from
Patches for KDE 3.2.3 are available from
patches as indicated in the message...
please apply + release...
thanks in advance
Steps to Reproduce:
kde please provide an updated ebuild.
it's already been integrated in the kdelibs-3.2.3-r1 ebuild for some time now.
caleb are you sure? It's a new one for kcookiejar and timestamp on the ftp server is from yesterday evening.
lovely - they released the patch to me some time ago and then changed it before they put it in the wild without notifying of the update.
anyway, kdelibs-3.2.3-r2.ebuild uses this new overwritten patch.
__that__ was fast... ;)
seems stable keywords were carried over... so the new ebuild is already stable on amd64.
these keywords are already stable.
Caleb thx for the swift reaction.
This is ready for GLSA. Security please draft.