Linux Security
    Linux Security
    Linux Security

    Debian: gtetrinet multiple buffer overflows

    Date 11 Dec 2002
    2703
    Posted By LinuxSecurity Advisories
    There are several buffer overflows in the gtetrinet package as shipped in Debian GNU/Linux 3.0, which could be abused by a malicious server.
    
    ------------------------------------------------------------------------
    Debian Security Advisory DSA-205-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                         Wichert Akkerman
    December 10, 2002
    ------------------------------------------------------------------------
    
    
    Package        : gtetrinet
    Problem type   : buffer overflow
    Debian-specific: no
    
    Steve Kemp and James Antill found several buffer overflows in the
    gtetrinet (a multiplayer tetris-like game) package as shipped in
    Debian GNU/Linux 3.0, which could be abused by a malicious server.
    
    This has been fixed in upstream version 0.4.4 and release
    0.4.1-9woody1.1 of the Debian package.
    
    ------------------------------------------------------------------------
    
    Obtaining updates:
    
      By hand:
        wget URL
            will fetch the file for you.
        dpkg -i FILENAME.deb
            will install the fetched file.
    
      With apt:
        deb  https://security.debian.org/ stable/updates main
            added to /etc/apt/sources.list will provide security updates
    
    Additional information can be found on the Debian security webpages
    at  https://www.debian.org/security/
    
    ------------------------------------------------------------------------
    
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Potato did not contain a gtetrinet package.
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
      powerpc, s390 and sparc.
    
      Source archives:
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1.dsc
          Size/MD5 checksum:     1317 55778a1c25bccb12cbc90c00c15108e9
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.dsc
          Size/MD5 checksum:      641 9cc2619b4aedfd4a8a4efaf537e25130
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.diff.gz
          Size/MD5 checksum:    19126 ab141cfe86b7c018aec366ac909863e6
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1.diff.gz
          Size/MD5 checksum:    19225 ecacb91e1bc4db55fb47c0f0ca281e4f
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1.orig.tar.gz
          Size/MD5 checksum:   144162 40c3808a683fcce0bae5c341a7245fa6
    
      alpha architecture (DEC Alpha)
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_alpha.deb
          Size/MD5 checksum:   123156 85348df49da23fce6b7ea384328d35ec
    
      arm architecture (ARM)
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_arm.deb
          Size/MD5 checksum:   110980 00cf7cd6649a1f8dc9b59fac11b855b4
    
      hppa architecture (HP PA RISC)
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_hppa.deb
          Size/MD5 checksum:   119402 4714cf8d32c80a64d556323dc4703581
    
      i386 architecture (Intel ia32)
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_i386.deb
          Size/MD5 checksum:   107954 5303aa820794aabb10e59ff06b837472
    
      ia64 architecture (Intel ia64)
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_ia64.deb
          Size/MD5 checksum:   135864 f41023f7f365eb3dcf853eb6345b1076
    
      m68k architecture (Motorola Mc680x0)
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_m68k.deb
          Size/MD5 checksum:   108370 a177457fc6ebcf4d83d612b299706005
    
      mips architecture (MIPS (Big Endian))
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_mips.deb
          Size/MD5 checksum:   114322 5d6032d9c88b4b820c9bde4a69ad9674
    
      mipsel architecture (MIPS (Little Endian))
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_mipsel.deb
          Size/MD5 checksum:   111968 f45a1a6b130ae372328ee0a047eed3fe
    
      powerpc architecture (PowerPC)
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_powerpc.deb
          Size/MD5 checksum:   114102 0b9840c44188e4262f65002a9b282b45
    
      s390 architecture (IBM S/390)
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_s390.deb
          Size/MD5 checksum:   113302 f5e85f1d430094a33c1b74572b9b5342
    
      sparc architecture (Sun SPARC/UltraSPARC)
    
         https://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_sparc.deb
          Size/MD5 checksum:   113772 ccd2017e251db41f6931f866246d61a6
    --
    ----------------------------------------------------------------------------
    Debian Security team <This email address is being protected from spambots. You need JavaScript enabled to view it.> 
    https://www.debian.org/security/
    Mailing-List: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.