Erik Sjölund discovered that a buffer overflow in fliccd which is installed setuid root can be exploited quite easily and will probably allow arbitrary code to be executed. We are waiting on a patch.
This issue should also affect FC2.
The setuid bit should probably be turned off while we're there.
yes, it should be romoved in next rebuild
it's only effected in FC3! and is now fixed in kdeedu-3.3.1-2.2.
Dirk Mueller said: " the previous patch was bogus. I've updated the bugs that were pointed out in it and diffed it against 3.3. Also, I removed non-relevant chunks from the diff. I've noticed that there is no fliccd in KDE 3.2.x and older. This means that the local-root vulnerability is restricted to KDE 3.3.x. will do an updated advisory tomorrow morning. public disclosure delayed until February 15"
yes, i have got this change. The new kdeedu-3.3.1-2.3, which i have built 2 days ago in fc3-updates-candidate, has the correct fix ;-)
public, removing embargo.
Pushed as FEDORA-2005-148 https://www.redhat.com/archives/fedora-announce-list/2005-February/msg00044.html