Language Selection

English French German Italian Portuguese Spanish

Whoops: KDE fliccd Buffer Overflow Vulnerabilities

Filed under
KDE
Security

"Erik Sjölund has reported some vulnerabilities in KDE, which can be exploited by malicious, local users to gain escalated privileges and potentially by malicious people to compromise a vulnerable system."

"The vulnerabilities are caused due to boundary errors in fliccd and can be exploited to cause stack-based buffer overflows... in KDE 3.3 through 3.3.2."

Quoted.

No word from KDE on the subject as of yet.

More in Tux Machines

Another Surprise: Mageia 5 RC is available!

I don't know why DistroWatch seemed to have missed it, but Mageia 5 RC is available for download. Read more

Another Surprise: Mageia 5 RC is available!

I don't know why DistroWatch seemed to have missed it, but Mageia 5 RC is available for download. Read more

The Open Source Community Support System

Whether you’re a novice Web developer or seasoned CIO, at some point you will require technical support with either a new IT development, task or project. What type of support will you want? With open source software, the flexibility and choice is yours. Read more

Debian 8.0 Jessie has been released!

There's a new sheriff in town. And her name is Jessie. We're happy to announce the release of Debian 8.0, codenamed Jessie. Want to install it? Choose your favourite installation media among Blu-ray Discs, DVDs, CDs and USB sticks. Then read the installation manual. For cloud users Debian also offers pre-built OpenStack images ready to use. Already a happy Debian user and you only want to upgrade? You are just an apt-get dist-upgrade away from Jessie! Find how, reading the installation guide and the release notes. Do you want to celebrate the release? Share the banner from this blog in your blog or your website! Read more