KDE 3.4.1 Info Page
KDE 3.4.1 was released on May 31st, 2005. Read the official announcement.
This page is no longer maintained. Currently, only KDE 4.2.0 and newer are maintained. Please have a look at the KDE 4.4.0 Info Page instead.
Please report possible problems to firstname.lastname@example.org.
Patches for the issues mentioned below are available from ftp://ftp.kde.org/pub/kde/security_patches unless stated otherwise.
The Gadu-Gadu protocol handler of Kopete 3.3 and above contains a copy
of libgadu, that is used if there is no system installed libgadu library.
Multiple integer overflow vulnerabilities have been found in libgadu.
Read the detailed advisory. KDE 3.3.x up to including KDE 3.4.1 are affected.
KPDF contains multiple integer overflow and integer arithmetic flaws that may make it possible
to execute arbitrary code on the client machine via remotely supplied PDF files.
Read the detailed advisory. All versions of KDE up to and including KDE 3.3.1 are affected.
The langen2kvtml script (included in kdeedu/kvoctrain) contains
multiple temp file generation vulnerabilities.
Read the detailed advisory. KDE 3.0.x up to including KDE 3.4.2 are affected.
The kcheckpass utility contains on certain platforms a local
Read the detailed advisory. KDE 3.2.0 up to including KDE 3.4.2 are affected.
kpdf contains several buffer overflows in its xpdf-based code which can be triggered
by a specially crafted pdf file.
Read the detailed advisory. All versions of KDE up to and including KDE 3.5.0 are affected.
kjs contains a heap based buffer overflow when decoding certain malcrafted utf8
Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.0 are affected.
kpdf contains a buffer overflow in its xpdf-based code which can be triggered
by a specially crafted pdf file.
Read the detailed advisory. All versions of KDE 3.3.0 up to and including KDE 3.5.1 are affected.
KDM contains a symlink attack vulnerability that allows a normal
user to read files from other users including root.
Read the detailed advisory. All versions of KDE starting with KDE 3.2.0 up to and including KDE 3.5.2 are affected.
kpdf contains a denial of service vulnerability in xpdf based code that
can cause the client to crash via a specially crafted pdf file.
Read the detailed advisory. All versions of KDE up to and including KDE 3.5.5 are affected.
This is a list of grave bugs and common pitfalls surfacing after the release was packaged:
- Some critical bugs in KPilot have been found: The memofile conduit will eat all previously synced memos; in addition, category names will be broken because the last character of each category name is removed. Apply kdepim-kpilot-fix.diff to the sources to fix it.
Please check the bug database before filing any bug reports. Also check for possible updates on this page that might describe or fix your problem.
Download and Installation
Library Requirements. KDE 3.4 requires or benefits from the given list of libraries, most of which should be already installed on your system or available from your OS CD or your vendor's website.
The complete source code for KDE 3.4.1 is available for download:
The Konstruct build toolset can help you downloading and installing these tarballs.Binary packages
Some Linux/UNIX OS vendors have kindly provided binary packages of KDE 3.4.1 for some versions of their distribution, and in other cases community volunteers have done so. Some of these binary packages are available for free download from KDE's http or FTP mirrors.
Currently pre-compiled packages are available for:
- Conectiva Linux
- Conectiva 10: Intel i386
- Hoary (Intel i386): Kubuntu KDE 3.4.1 packages page
- KDE-RedHat (unofficial) Packages:
- Slackware (Unofficial contribution) (README) :
- KDE Solaris (Unofficial contribution) (README) :
- SuSE Linux (README) :
Additional binary packages might become available in the coming weeks, as well as updates to the current packages.