Hey, nice roundtrip :) Actually this additional updates for CVE-2016-7966 were introduced by me, when I was fixing the Debian packages.
This means the packages in Debian have the additional patches backported already. Regards, sandro -- Am Mittwoch, 2. November 2016, 10:14:06 CET schrieb Martin Steigerwald: > Hello! > > For your information, it seems that a complete fix for the security > vulnerability needs additional patches. > > Thank you, > Martin > > ---------- Weitergeleitete Nachricht ---------- > > Betreff: Re: KDE Project Security Advisory: KMail: HTML injection in plain > text viewer > Datum: Dienstag, 1. November 2016, 23:42:54 CET > Von: Albert Astals Cid <aa...@kde.org> > An: KDE announce list <kde-annou...@kde.org> > > Updated Information (1 November 2016) > ===================================== > > The above mentioned patches are not enough to fix the vulnerability > completely. This wasn't visible, because the patches for CVE-2016-7967 and > CVE-2016-7968 made sure, > that this vulnerability can't harm anymore. > It only became visible, that this vulnerability isn't closed completely for > systems, > that are only affected by this CVE. > > For KCoreAddons you need: > https://quickgit.kde.org/? > p=kcoreaddons.git&a=commitdiff&h=96e562d9138c100498da38e4c5b4091a226dde12 > for applying this patch you may also need to cherry-pick: > https://quickgit.kde.org/? > p=kcoreaddons.git&a=commitdiff&h=1be7272373d60e4234f1a5584e676b579302b053 > (these two are released in KCoreAddons KDE Frameworks 5.27.0) > > additionally git commits, to close completely: > https://quickgit.kde.org/? > p=kcoreaddons.git&a=commitdiff&h=5e13d2439dbf540fdc840f0b0ab5b3ebf6642c6a > not needed in the strong sense, but this will give you the additional > automatic tests, to test if this CVE is closed: > https://quickgit.kde.org/? > p=kcoreaddons.git&a=commitdiff&h=a06cef31cc4c908bc9b76bd9d103fe9c60e0953f > (will be part of KCoreAddons KDE Frameworks 5.28.0) > > For kdepimlibs 4.14: > https://quickgit.kde.org/? > p=kdepimlibs.git&a=commitdiff&h=176fee25ca79145ab5c8e2275d248f1a46a8d8cf > https://quickgit.kde.org/? > p=kdepimlibs.git&a=commitdiff&h=8bbe1bd3fdc55f609340edc667ff154b3d2aaab1 > kdepimlibs is at end of life, so no further release is planned. > > > El dijous, 6 d’octubre de 2016, a les 19:44:33 CET, Albert Astals Cid va > > escriure: > > KDE Project Security Advisory > > ============================= > > > > Title: KMail: HTML injection in plain text viewer > > Risk Rating: Important > > CVE: CVE-2016-7966 > > Platforms: All > > Versions: kmail >= 4.4.0 > > Author: Andre Heinecke <aheine...@intevation.de> > > Date: 6 October 2016 > > > > Overview > > ======== > > > > Through a malicious URL that contained a quote character it > > was possible to inject HTML code in KMail's plain text viewer. > > Due to the parser used on the URL it was not possible to include > > the equal sign (=) or a space into the injected HTML, which greatly > > reduces the available HTML functionality. Although it is possible > > to include an HTML comment indicator to hide content. > > > > Impact > > ====== > > > > An unauthenticated attacker can send out mails with malicious content > > that breaks KMail's plain text HTML escape logic. Due to the limitations > > of the provided HTML in itself it might not be serious. But as a way > > to break out of KMail's restricted Plain text mode this might open > > the way to the exploitation of other vulnerabilities in the HTML viewer > > code, which is disabled by default. > > > > Workaround > > ========== > > > > None. > > > > Solution > > ======== > > > > For KDE Frameworks based releases of KMail apply the following patch to > > kcoreaddons: > > https://quickgit.kde.org/?p=kcoreaddons.git&a=commitdiff&h=96e562d9138c100 > > 49 8da38e4c5b4091a226dde12 > > > > For kdelibs4 based releases apply the following patch: > > https://quickgit.kde.org/?p=kdepimlibs.git&a=commitdiff&h=176fee25ca79145a > > b5 c8e2275d248f1a46a8d8cf > > > > Credits > > ======= > > > > Thanks to Roland Tapken for reporting this issue, Andre Heinecke from > > Intevation GmbH for analysing the problems and Laurent Montel for > > fixing this issue. > > -------------------------------------------------------------
signature.asc
Description: This is a digitally signed message part.