Fedora 11 : akonadi-1.2.1-1.fc11 / kde-l10n-4.3.1-2.fc11 / kdeaccessibility-4.3.1-1.fc11 / etc (2009-9397)

high Nessus Plugin ID 40990

Synopsis

The remote Fedora host is missing one or more security updates.

Description

This updates KDE to 4.3.1, the latest upstream bugfix release. The main improvements are: * KDE 4.3 is now also available in Croatian. * A crash when editing toolbar setup has been fixed. * Support for transferring files through SSH using KIO::Fish has been fixed. * A number of bugs in KWin, KDE's window and compositing manager has been fixed. * A large number of bugs in KMail, KDE's email client are now gone. See http://kde.org/announcements/announce-4.3.1.php for more information. In addition, this update: * fixes a potential security issue (CVE-2009-2702) with certificate validation in the KIO KSSL code. It is believed that the affected code is not actually used (the code in Qt, for which a security update was already issued, is) and thus the issue is only potential, but KSSL is being patched just in case, * splits PolicyKit-kde out of kdebase-workspace again to avoid forcing it onto GNOME-based setups, where PolicyKit-gnome is desired instead (#519654).

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected packages.

See Also

https://www.kde.org/announcements/announce-4.3.1.php

https://bugzilla.redhat.com/show_bug.cgi?id=520661

http://www.nessus.org/u?13acfbdd

http://www.nessus.org/u?82e4bfc7

http://www.nessus.org/u?5278128c

http://www.nessus.org/u?962f98d1

http://www.nessus.org/u?806f73e7

http://www.nessus.org/u?9e30b566

http://www.nessus.org/u?695a1178

http://www.nessus.org/u?8dc47c3c

http://www.nessus.org/u?e7ad3e31

http://www.nessus.org/u?ad0ea05a

http://www.nessus.org/u?8ce3be09

http://www.nessus.org/u?a7703de3

http://www.nessus.org/u?70d44980

http://www.nessus.org/u?4937f018

http://www.nessus.org/u?aa76debe

http://www.nessus.org/u?9b702a69

http://www.nessus.org/u?393bda9d

http://www.nessus.org/u?5d5f15fa

http://www.nessus.org/u?57046329

http://www.nessus.org/u?33df8c51

http://www.nessus.org/u?0b16177e

http://www.nessus.org/u?68bf4020

http://www.nessus.org/u?5f0f09ae

http://www.nessus.org/u?2ca49022

Plugin Details

Severity: High

ID: 40990

File Name: fedora_2009-9397.nasl

Version: 1.20

Type: local

Agent: unix

Published: 9/16/2009

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:kdebindings, p-cpe:/a:fedoraproject:fedora:kdebase-runtime, p-cpe:/a:fedoraproject:fedora:kdebase-workspace, p-cpe:/a:fedoraproject:fedora:kdebase, p-cpe:/a:fedoraproject:fedora:kdeutils, p-cpe:/a:fedoraproject:fedora:kdeartwork, p-cpe:/a:fedoraproject:fedora:kdeaccessibility, p-cpe:/a:fedoraproject:fedora:kdeadmin, p-cpe:/a:fedoraproject:fedora:kdeedu, p-cpe:/a:fedoraproject:fedora:kdegames, p-cpe:/a:fedoraproject:fedora:kdemultimedia, p-cpe:/a:fedoraproject:fedora:kdelibs-experimental, cpe:/o:fedoraproject:fedora:11, p-cpe:/a:fedoraproject:fedora:kdelibs, p-cpe:/a:fedoraproject:fedora:kdepimlibs, p-cpe:/a:fedoraproject:fedora:kdegraphics, p-cpe:/a:fedoraproject:fedora:oxygen-icon-theme, p-cpe:/a:fedoraproject:fedora:akonadi, p-cpe:/a:fedoraproject:fedora:kde-l10n, p-cpe:/a:fedoraproject:fedora:kdepim, p-cpe:/a:fedoraproject:fedora:kdetoys, p-cpe:/a:fedoraproject:fedora:kdepim-runtime, p-cpe:/a:fedoraproject:fedora:kdeplasma-addons, p-cpe:/a:fedoraproject:fedora:kdenetwork, p-cpe:/a:fedoraproject:fedora:kdesdk

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/9/2009

Vulnerability Publication Date: 9/8/2009

Reference Information

CVE: CVE-2009-2702

BID: 36229

CWE: 310

FEDORA: 2009-9397