KDE 2.2.2 was released on November 21, 2001. Read the official announcement.
For a list of changes since KDE 2.2.1, see the list of changes
For a high-level overview of the features of KDE, see the KDE info page
For a graphical tutorial on using KDE 2, see this tutorial page from Linux Mandrake
This page will be updated to reflect changes in the status of 2.2.2 so check back for new information.
If you want to compile from sources we offer instructions and help for common problems in the Compilation FAQ.
Please refer to KDE 3.0, the next stable release.
Konqueror fails to correctly initialize the site domains for sub-(i)frames and may as a result allow access to forein cookies.
It is strongly recommended to upgrade at least kdelibs to KDE 3.0.3a in which this bug is fixed.
A patch is also available for download to address this particular problem.
KDE's SSL implementation fails to check the basic constraints on certificates and as a result may accept certificates as valid that were signed by an issuer who was not authorized to do so.
Due to this, users of Konqueror and other SSL enabled KDE software may fall victim to a malicious man-in-the-middle attack without noticing. In such case the user will be under the impression that there is a secure connection with a trusted site while in fact a different site has been connected to.
We recommend users to upgrade to at least KDE 3.0.3 but a patch for KDE 2.2.2 is also available.
chmod u-s artswrapper
Several buffer overflows have been found in code KGhostview shared from other postscript viewers. Read the detailed advisory. Update to KDE 3.0.4 is recommended.
A patch is also available for download to address this particular problem.
Several shell escaping vulnerabilities have been found throughout KDE which allow a remote attacker to execute commands as the local user. Read the detailed advisory. It is strongly recommended to update to KDE 3.0.5a.
Several patches that address these issues have been made available for those who are unable to update to KDE 3.x.
Several problems with KDE's use of Ghostscript where discovered that allow the execution of arbitrary commands contained in PostScript (PS) or PDF files with the privileges of the victim. Read the detailed advisory. It is strongly recommended to update to KDE 3.1.1a
Several patches that address these issues have been made available for those who are unable to update to KDE 3.x.
KDE's SSL implementation in KDE 2.x matches certificates based on IP number instead of hostname. Due to this, users of Konqueror and other SSL enabled KDE software may fall victim to a malicious man-in-the-middle attack without noticing. In such case the user will be under the impression that there is a secure connection with a trusted site while in fact a different site has been connected to. Read the detailed advisory.
We recommend users to upgrade to the KDE 3.x series but patches for KDE 2.2.2 [1, 2] are also available.
No major bugs are known.
Please check the bug database before filing any bug reports. Also check for possible updates that might fix your problem.
There is also info on the architecture and the programming interface of KDE 2.2.2.