TechWorld.com - Linux users who patched their systems for a serious security vulnerability in K Desktop Environment last month will have to patch once again, because of errors in the original patch, according to the KDE project.
The vulnerability affects kdelibs, specifically an error in the kimgio component when processing PCX image files. Kimgio is used in KHTML-based Web browsers as well as KDE imaging applications such as kpresenter and ksnapshot, meaning that if an image crafted to exploit the flaw were viewed in any of these applications, they could allow an attacker to execute malicious code and take over a system. The flaw affects KDE Versions 3.2 to 3.4, according to KDE.
The patches issued last month fixed most of the problems but still allowed local users to exploit the bug by serving files from the /tmp directory, KDE said in an advisory. They also introduced a new bug, breaking kimgio's compatibility with .rgb images.
The problems will mean a fresh round of patching for Unix-derived systems using KDE, one of the two most popular desktop environments for Unix and Linux. KDE released a new patch fixing the problems with the original patch, and operating system vendors such as Red Hat and SUSE have followed suit this week.
Software vendors are under pressure to deliver timely patches, but faulty updates are not unknown as a result, say security experts. This week, for instance, Microsoft re-released a critical security update after it caused networking problems for many users.
Such problems can mean a major headache for system administrators, but they seem to be on the wane, according to Thomas Kristensen, chief technology officer at Danish security firm Secunia. "Generally speaking, I'd say that most vendors have improved significantly over the last two years when it comes to quality testing of their security fixes," he said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- 3 Steps for Enterprise Mobility Success: Strategy, Roadmap and Policy Having a mobile strategy is as essential as having a business plan or mission statement. A mobile strategy communicates to stakeholders, IT and...
- Enterprise Collaboration Strategy An Enterprise Collaboration Strategy will help organizations speed up innovation, better serve customers and quickly pivot to adopt rapidly changing Unified Communications &...
- Riverbed Stingray Application Firewall: Securing Cloud Applications with a Distributed Web Application Firewall Responsibility over IT security is moving away from the network and IT infrastructure and to the application and software architecture itself. IT organizations...
- The MDM advantage: Creating insight from big data To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to...
- The Software-Defined Data Center: Is your ADC ready? Data center transformation is accelerating beyond virtualization to next-generation cloud architectures and software-defined data centers, bringing new challenges for application performance, scalability and...
- Solving the Big Data Challenge of Sensor Data This webcast will focus on sensor data applications and IBM's differentiated offering to solve the IT challenges of sensor data for better business... All Enterprise Architecture White Papers | Webcasts