Processing commands for cont...@bugs.debian.org:
> tags 947005 pending
Bug #947005 [src:nethack] nethack: CVE-2019-19905: buffer overflow when parsing
config files
Added tag(s) pending.
> tags 953978 pending
Bug #953978 [src:nethack] nethack: CVE-2020-5254
Added tag(s) pending.
> thanks
Stopping
Version 3.6.5 has been released, which fixes additional security issues:
CVE-2020-5209, CVE-2020-5210, CVE-2020-5211, CVE-2020-5212,
CVE-2020-5213, CVE-2020-5214.
See also:
https://nethack.org/v365/release.html
https://www.nethack.org/security/
signature.asc
Description: PGP signature
Control: retitle -1 nethack: CVE-2019-19905: buffer overflow when parsing
config files
On Thu, Dec 19, 2019 at 11:57:42AM +0100, Reiner Herrmann wrote:
> Source: nethack
> Version: 3.6.0-1
> Severity: grave
> Tags: security
> X-Debbugs-Cc: t...@security.debian.org
>
> Hi,
>
> a new version of N
Processing control commands:
> retitle -1 nethack: CVE-2019-19905: buffer overflow when parsing config files
Bug #947005 [src:nethack] nethack: buffer overflow when parsing config files
Changed Bug title to 'nethack: CVE-2019-19905: buffer overflow when parsing
config files' from 'nethack: buffer
Source: nethack
Version: 3.6.0-1
Severity: grave
Tags: security
X-Debbugs-Cc: t...@security.debian.org
Hi,
a new version of NetHack has been released that fixes a privilege
escalation issue introduced in 3.6.0 [0] [1]:
> A buffer overflow issue exists when reading very long lines from a
> NetHac
5 matches
Mail list logo