--- Begin Message ---
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-205-1 security@debian.org
http://www.debian.org/security/ Wichert Akkerman
December 10, 2002
- ------------------------------------------------------------------------
Package : gtetrinet
Problem type : buffer overflow
Debian-specific: no
Steve Kemp and James Antill found several buffer overflows in the
gtetrinet (a multiplayer tetris-like game) package as shipped in
Debian GNU/Linux 3.0, which could be abused by a malicious server.
This has been fixed in upstream version 0.4.4 and release
0.4.1-9woody1.1 of the Debian package.
- ------------------------------------------------------------------------
Obtaining updates:
By hand:
wget URL
will fetch the file for you.
dpkg -i FILENAME.deb
will install the fetched file.
With apt:
deb http://security.debian.org/ stable/updates main
added to /etc/apt/sources.list will provide security updates
Additional information can be found on the Debian security webpages
at http://www.debian.org/security/
- ------------------------------------------------------------------------
Debian GNU/Linux 2.2 alias potato
- ---------------------------------
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
Potato did not contain a gtetrinet package.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1.dsc
Size/MD5 checksum: 1317 55778a1c25bccb12cbc90c00c15108e9
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.dsc
Size/MD5 checksum: 641 9cc2619b4aedfd4a8a4efaf537e25130
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.diff.gz
Size/MD5 checksum: 19126 ab141cfe86b7c018aec366ac909863e6
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1.diff.gz
Size/MD5 checksum: 19225 ecacb91e1bc4db55fb47c0f0ca281e4f
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1.orig.tar.gz
Size/MD5 checksum: 144162 40c3808a683fcce0bae5c341a7245fa6
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_alpha.deb
Size/MD5 checksum: 123156 85348df49da23fce6b7ea384328d35ec
arm architecture (ARM)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_arm.deb
Size/MD5 checksum: 110980 00cf7cd6649a1f8dc9b59fac11b855b4
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_hppa.deb
Size/MD5 checksum: 119402 4714cf8d32c80a64d556323dc4703581
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_i386.deb
Size/MD5 checksum: 107954 5303aa820794aabb10e59ff06b837472
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_ia64.deb
Size/MD5 checksum: 135864 f41023f7f365eb3dcf853eb6345b1076
m68k architecture (Motorola Mc680x0)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_m68k.deb
Size/MD5 checksum: 108370 a177457fc6ebcf4d83d612b299706005
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_mips.deb
Size/MD5 checksum: 114322 5d6032d9c88b4b820c9bde4a69ad9674
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_mipsel.deb
Size/MD5 checksum: 111968 f45a1a6b130ae372328ee0a047eed3fe
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_powerpc.deb
Size/MD5 checksum: 114102 0b9840c44188e4262f65002a9b282b45
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_s390.deb
Size/MD5 checksum: 113302 f5e85f1d430094a33c1b74572b9b5342
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/g/gtetrinet/gtetrinet_0.4.1-9woody1.1_sparc.deb
Size/MD5 checksum: 113772 ccd2017e251db41f6931f866246d61a6
- --
- ----------------------------------------------------------------------------
Debian Security team <team@security.debian.org>
http://www.debian.org/security/
Mailing-List: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE99mnaPLiSUC+jvC0RAnNRAJ9r9xNr7PvwwLTg2HkxwllLY+24HwCffr/Y
4UJzLuq3HCGZaYWle6nY+F8=
=W5mF
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
--- End Message ---