Bug#947005: nethack: buffer overflow when parsing config files

2020-02-02 Thread Reiner Herrmann
Version 3.6.5 has been released, which fixes additional security issues: CVE-2020-5209, CVE-2020-5210, CVE-2020-5211, CVE-2020-5212, CVE-2020-5213, CVE-2020-5214. See also: https://nethack.org/v365/release.html https://www.nethack.org/security/ signature.asc Description: PGP signature

Bug#947005: nethack: buffer overflow when parsing config files

2019-12-19 Thread Salvatore Bonaccorso
Control: retitle -1 nethack: CVE-2019-19905: buffer overflow when parsing config files On Thu, Dec 19, 2019 at 11:57:42AM +0100, Reiner Herrmann wrote: > Source: nethack > Version: 3.6.0-1 > Severity: grave > Tags: security > X-Debbugs-Cc: t...@security.debian.org > > Hi, > > a new version of N

Bug#947005: nethack: buffer overflow when parsing config files

2019-12-19 Thread Reiner Herrmann
Source: nethack Version: 3.6.0-1 Severity: grave Tags: security X-Debbugs-Cc: t...@security.debian.org Hi, a new version of NetHack has been released that fixes a privilege escalation issue introduced in 3.6.0 [0] [1]: > A buffer overflow issue exists when reading very long lines from a > NetHac