Source: dosbox
Version: 0.74-2-3
Severity: important
Tags: security upstream
Control: found -1 0.74-4.2+deb9u1
Control: found -1 0.74-4

Hi,

The following vulnerabilities were published for dosbox.

> From https://www.dosbox.com/news.php?show_news=1
> 
> DOSBox 0.74-3 has been released!
> 
> A security release for DOSBox 0.74:
> 
>     Fixed that a very long line inside a bat file would overflow the
>     parsing buffer. (CVE-2019-7165 by Alexandre Bartel)

>     Added a basic permission system so that a program running inside
>     DOSBox can't access the contents of /proc (e.g. /proc/self/mem)
>     when / or /proc were (to be) mounted. (CVE-2019-12594 by Alexandre
>     Bartel)

>     Several other fixes for out of bounds access and buffer overflows.

>     Some fixes to the OpenGL rendering.
> 
> 
> The game compatibility should be identical to 0.74 and 0.74-2.
> It's recommended to use config -securemode when dealing with
> untrusted files.
> 
> 
> Ideally, 0.75 should have been released by now, but some bugs took a
> lot longer than expected.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-7165
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7165
[1] https://security-tracker.debian.org/tracker/CVE-2019-12594
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12594

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to