Package: kdeedu
Severity: grave
Tags: security sid patch sarge

Erik Sjölund discovered that a buffer overflow in fliccd which is
installed setuid root (at least on Debian/unstable) can be exploited
quite easily and will probably allow arbitrary code to be executed.

Patch:
ftp://ftp.kde.org/pub/kde/security_patches/post-3.3.2-kdeedu-kstars.diff

Please
 . update the package in sid and sarge
 . mention the CVE id from the subject in the changelog
 . use priority=high

Regards,

        Joey

-- 
Ten years and still binary compatible.  -- XFree86

Please always Cc to me when replying to me on the lists.

Reply via email to