Control: tags -1 pending On Sat, 2016-03-26 at 23:49 +0000, James Cowgill wrote: > On Sat, 2016-03-26 at 23:34 +0000, James Cowgill wrote: > > y@d:~$ uname -a > > Linux d 4.4.0-1-amd64 #1 SMP Debian 4.4.6-1 (2016-03-17) x86_64 > > GNU/Linux > > y@d:~$ nethack > > *** buffer overflow detected ***: /usr/lib/games/nethack/nethack- > > console > > terminated > > ======= Backtrace: ========= > > /lib/x86_64-linux-gnu/libc.so.6(+0x71ff5)[0x7f22847c6ff5] > > /lib/x86_64-linux-gnu/libc.so.6(__fortify_fail+0x37)[0x7f228484e347] > > /lib/x86_64-linux-gnu/libc.so.6(+0xf7510)[0x7f228484c510] > > /usr/lib/games/nethack/nethack-console[0x470e16] > This address corresponds to the call to strcpy in src/files.c line > 2110. It appears copying the input config line has has overflowed the > 'buf' variable located on the stack.
And I've just seen that upstream has already fixed this in commit 288ac4b07c82 (avoid crash for long lines in nethackrc). It's fixed in the Debian git repository and it'll be uploaded at some point. Thanks, James
signature.asc
Description: This is a digitally signed message part