Debian: gtetrinet multiple buffer overflows

    Date11 Dec 2002
    CategoryDebian
    2583
    Posted ByLinuxSecurity Advisories
    There are several buffer overflows in the gtetrinet package as shipped in Debian GNU/Linux 3.0, which could be abused by a malicious server.
    
    ------------------------------------------------------------------------
    Debian Security Advisory DSA-205-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                         Wichert Akkerman
    December 10, 2002
    ------------------------------------------------------------------------
    
    
    Package        : gtetrinet
    Problem type   : buffer overflow
    Debian-specific: no
    
    Steve Kemp and James Antill found several buffer overflows in the
    gtetrinet (a multiplayer tetris-like game) package as shipped in
    Debian GNU/Linux 3.0, which could be abused by a malicious server.
    
    This has been fixed in upstream version 0.4.4 and release
    0.4.1-9woody1.1 of the Debian package.
    
    ------------------------------------------------------------------------
    
    Obtaining updates:
    
      By hand:
        wget URL
            will fetch the file for you.
        dpkg -i FILENAME.deb
            will install the fetched file.
    
      With apt:
        deb  http://security.debian.org/ stable/updates main
            added to /etc/apt/sources.list will provide security updates
    
    Additional information can be found on the Debian security webpages
    at  http://www.debian.org/security/
    
    ------------------------------------------------------------------------
    
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Potato did not contain a gtetrinet package.
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
      powerpc, s390 and sparc.
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1.dsc
          Size/MD5 checksum:     1317 55778a1c25bccb12cbc90c00c15108e9
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.dsc
          Size/MD5 checksum:      641 9cc2619b4aedfd4a8a4efaf537e25130
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.diff.gz
          Size/MD5 checksum:    19126 ab141cfe86b7c018aec366ac909863e6
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1.diff.gz
          Size/MD5 checksum:    19225 ecacb91e1bc4db55fb47c0f0ca281e4f
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1.orig.tar.gz
          Size/MD5 checksum:   144162 40c3808a683fcce0bae5c341a7245fa6
    
      alpha architecture (DEC Alpha)
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_alpha.deb
          Size/MD5 checksum:   123156 85348df49da23fce6b7ea384328d35ec
    
      arm architecture (ARM)
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_arm.deb
          Size/MD5 checksum:   110980 00cf7cd6649a1f8dc9b59fac11b855b4
    
      hppa architecture (HP PA RISC)
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_hppa.deb
          Size/MD5 checksum:   119402 4714cf8d32c80a64d556323dc4703581
    
      i386 architecture (Intel ia32)
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_i386.deb
          Size/MD5 checksum:   107954 5303aa820794aabb10e59ff06b837472
    
      ia64 architecture (Intel ia64)
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_ia64.deb
          Size/MD5 checksum:   135864 f41023f7f365eb3dcf853eb6345b1076
    
      m68k architecture (Motorola Mc680x0)
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_m68k.deb
          Size/MD5 checksum:   108370 a177457fc6ebcf4d83d612b299706005
    
      mips architecture (MIPS (Big Endian))
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_mips.deb
          Size/MD5 checksum:   114322 5d6032d9c88b4b820c9bde4a69ad9674
    
      mipsel architecture (MIPS (Little Endian))
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_mipsel.deb
          Size/MD5 checksum:   111968 f45a1a6b130ae372328ee0a047eed3fe
    
      powerpc architecture (PowerPC)
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_powerpc.deb
          Size/MD5 checksum:   114102 0b9840c44188e4262f65002a9b282b45
    
      s390 architecture (IBM S/390)
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_s390.deb
          Size/MD5 checksum:   113302 f5e85f1d430094a33c1b74572b9b5342
    
      sparc architecture (Sun SPARC/UltraSPARC)
    
         http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_sparc.deb
          Size/MD5 checksum:   113772 ccd2017e251db41f6931f866246d61a6
    --
    ----------------------------------------------------------------------------
    Debian Security team <This email address is being protected from spambots. You need JavaScript enabled to view it.> 
    http://www.debian.org/security/
    Mailing-List: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"40","type":"x","order":"1","pct":48.78,"resources":[]},{"id":"88","title":"Should be more technical","votes":"13","type":"x","order":"2","pct":15.85,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"29","type":"x","order":"3","pct":35.37,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.