------------------------------------------------------------------------
Debian Security Advisory DSA-205-1                   security@debian.org 
Debian -- Security Information                          Wichert Akkerman
December 10, 2002
------------------------------------------------------------------------


Package        : gtetrinet
Problem type   : buffer overflow
Debian-specific: no

Steve Kemp and James Antill found several buffer overflows in the
gtetrinet (a multiplayer tetris-like game) package as shipped in
Debian GNU/Linux 3.0, which could be abused by a malicious server.

This has been fixed in upstream version 0.4.4 and release
0.4.1-9woody1.1 of the Debian package.

------------------------------------------------------------------------

Obtaining updates:

  By hand:
    wget URL
        will fetch the file for you.
    dpkg -i FILENAME.deb
        will install the fetched file.

  With apt:
    deb  Debian -- Security Information  stable/updates main
        added to /etc/apt/sources.list will provide security updates

Additional information can be found on the Debian security webpages
at  Debian -- Security Information 

------------------------------------------------------------------------


Debian GNU/Linux 2.2 alias potato
---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Potato did not contain a gtetrinet package.


Debian GNU/Linux 3.0 alias woody
--------------------------------

  Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
  powerpc, s390 and sparc.

  Source archives:

      
      Size/MD5 checksum:     1317 55778a1c25bccb12cbc90c00c15108e9
      
      Size/MD5 checksum:      641 9cc2619b4aedfd4a8a4efaf537e25130
      
      Size/MD5 checksum:    19126 ab141cfe86b7c018aec366ac909863e6
      
      Size/MD5 checksum:    19225 ecacb91e1bc4db55fb47c0f0ca281e4f
      
      Size/MD5 checksum:   144162 40c3808a683fcce0bae5c341a7245fa6

  alpha architecture (DEC Alpha)

      
      Size/MD5 checksum:   123156 85348df49da23fce6b7ea384328d35ec

  arm architecture (ARM)

      
      Size/MD5 checksum:   110980 00cf7cd6649a1f8dc9b59fac11b855b4

  hppa architecture (HP PA RISC)

      
      Size/MD5 checksum:   119402 4714cf8d32c80a64d556323dc4703581

  i386 architecture (Intel ia32)

      
      Size/MD5 checksum:   107954 5303aa820794aabb10e59ff06b837472

  ia64 architecture (Intel ia64)
      
      Size/MD5 checksum:   135864 f41023f7f365eb3dcf853eb6345b1076

  m68k architecture (Motorola Mc680x0)

      
      Size/MD5 checksum:   108370 a177457fc6ebcf4d83d612b299706005

  mips architecture (MIPS (Big Endian))

      
      Size/MD5 checksum:   114322 5d6032d9c88b4b820c9bde4a69ad9674

  mipsel architecture (MIPS (Little Endian))

      
      Size/MD5 checksum:   111968 f45a1a6b130ae372328ee0a047eed3fe

  powerpc architecture (PowerPC)

      
      Size/MD5 checksum:   114102 0b9840c44188e4262f65002a9b282b45

  s390 architecture (IBM S/390)

      
      Size/MD5 checksum:   113302 f5e85f1d430094a33c1b74572b9b5342

  sparc architecture (Sun SPARC/UltraSPARC)

      
      Size/MD5 checksum:   113772 ccd2017e251db41f6931f866246d61a6
--
----------------------------------------------------------------------------
Debian Security team <team@security.debian.org> 
Debian -- Security Information 
Mailing-List: debian-security-announce@lists.debian.org


Debian: gtetrinet multiple buffer overflows

December 11, 2002
There are several buffer overflows in the gtetrinet package as shipped in Debian GNU/Linux 3.0, which could be abused by a malicious server.

Summary

Package : gtetrinet
Problem type : buffer overflow
Debian-specific: no

Steve Kemp and James Antill found several buffer overflows in the
gtetrinet (a multiplayer tetris-like game) package as shipped in
Debian GNU/Linux 3.0, which could be abused by a malicious server.

This has been fixed in upstream version 0.4.4 and release
0.4.1-9woody1.1 of the Debian package.

------------------------------------------------------------------------

Obtaining updates:

By hand:
wget URL
will fetch the file for you.
dpkg -i FILENAME.deb
will install the fetched file.

With apt:
deb Debian -- Security Information stable/updates main
added to /etc/apt/sources.list will provide security updates

Additional information can be found on the Debian security webpages
at Debian -- Security Information

------------------------------------------------------------------------


Debian GNU/Linux 2.2 alias potato
---------------------------------

Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

Potato did not contain a gtetrinet package.


Debian GNU/Linux 3.0 alias woody
--------------------------------

Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
powerpc, s390 and sparc.

Source archives:


Size/MD5 checksum: 1317 55778a1c25bccb12cbc90c00c15108e9

Size/MD5 checksum: 641 9cc2619b4aedfd4a8a4efaf537e25130

Size/MD5 checksum: 19126 ab141cfe86b7c018aec366ac909863e6

Size/MD5 checksum: 19225 ecacb91e1bc4db55fb47c0f0ca281e4f

Size/MD5 checksum: 144162 40c3808a683fcce0bae5c341a7245fa6

alpha architecture (DEC Alpha)


Size/MD5 checksum: 123156 85348df49da23fce6b7ea384328d35ec

arm architecture (ARM)


Size/MD5 checksum: 110980 00cf7cd6649a1f8dc9b59fac11b855b4

hppa architecture (HP PA RISC)


Size/MD5 checksum: 119402 4714cf8d32c80a64d556323dc4703581

i386 architecture (Intel ia32)


Size/MD5 checksum: 107954 5303aa820794aabb10e59ff06b837472

ia64 architecture (Intel ia64)

Size/MD5 checksum: 135864 f41023f7f365eb3dcf853eb6345b1076

m68k architecture (Motorola Mc680x0)


Size/MD5 checksum: 108370 a177457fc6ebcf4d83d612b299706005

mips architecture (MIPS (Big Endian))


Size/MD5 checksum: 114322 5d6032d9c88b4b820c9bde4a69ad9674

mipsel architecture (MIPS (Little Endian))


Size/MD5 checksum: 111968 f45a1a6b130ae372328ee0a047eed3fe

powerpc architecture (PowerPC)


Size/MD5 checksum: 114102 0b9840c44188e4262f65002a9b282b45

s390 architecture (IBM S/390)


Size/MD5 checksum: 113302 f5e85f1d430094a33c1b74572b9b5342

sparc architecture (Sun SPARC/UltraSPARC)


Size/MD5 checksum: 113772 ccd2017e251db41f6931f866246d61a6
--
----------------------------------------------------------------------------
Debian Security team <team@security.debian.org>
Debian -- Security Information
Mailing-List: debian-security-announce@lists.debian.org




Severity

Related News