KDE 3.0 was released on April 3rd, 2002. Read the official announcement.
This page will be updated to reflect changes in the status of 3.0 release so check back for new information.
This page is no longer maintained. Currently, only KDE 4.2.0 and newer are maintained. Please have a look at the KDE 4.4.0 Info Page instead.
Binary packages can be found under http://download.kde.org/stable/3.0/ or in the equivalent directory at one of the KDE FTP mirrors. Additional binary packages might become available in the coming weeks, as well as updates to the current packages.
If you want to compile from sources we offer the source tarballs, besides instructions for compiling and help for commonly reported compilation problems in the Compilation FAQ.
KDE 3.0.1 has been released as of May 22nd, 2001 -- see the official announcement for details. Users are encouraged to upgrade. This page will no longer be updated.
Konqueror fails to detect the "secure" flag in HTTP cookies and as a result may send secure cookies back to the originating site over an unencrypted network connection.
It is strongly recommended to upgrade at least kdelibs to KDE 3.0.3a in which this bug is fixed.
A patch is also available for download to address this particular problem.
Konqueror fails to correctly initialize the site domains for sub-(i)frames and may as a result allow access to forein cookies.
It is strongly recommended to upgrade at least kdelibs to KDE 3.0.3a in which this bug is fixed.
A patch is also available for download to address this particular problem.
KDE's SSL implementation fails to check the basic constraints on certificates and as a result may accept certificates as valid that were signed by an issuer who was not authorized to do so.
Due to this, users of Konqueror and other SSL enabled KDE software may fall victim to a malicious man-in-the-middle attack without noticing. In such case the user will be under the impression that there is a secure connection with a trusted site while in fact a different site has been connected to.
It is strongly recommended to upgrade at least kdelibs to KDE 3.0.3 in which this bug is fixed.
A format string vulnerability was found in the commonly used talkd implementation, which ktalk(d) uses.
A patch is available for download to address this particular problem.
The use of ktalk(d) is strongly discouraged in any security relevant area. Use it with care, and never make it accessible outside your local, trusted network.
chmod u-s artswrapper
Several shell escaping vulnerabilities have been found throughout KDE which allow a remote attacker to execute commands as the local user. Read the detailed advisory. It is strongly recommended to update to KDE 3.0.5a.
This is a list of grave bugs and common pitfalls surfacing after the release date:
Please check the bug database before filing any bug reports. Also check for possible updates on this page that might describe or fix your problem.
There is also info on the architecture and the programming interface of KDE 3.0.