Package: kdeedu Severity: grave Tags: security sid patch sarge Erik Sjölund discovered that a buffer overflow in fliccd which is installed setuid root (at least on Debian/unstable) can be exploited quite easily and will probably allow arbitrary code to be executed.
Patch: ftp://ftp.kde.org/pub/kde/security_patches/post-3.3.2-kdeedu-kstars.diff Please . update the package in sid and sarge . mention the CVE id from the subject in the changelog . use priority=high Regards, Joey -- Ten years and still binary compatible. -- XFree86 Please always Cc to me when replying to me on the lists.