[28921] in bugtraq
GLSA: nethack
daemon@ATHENA.MIT.EDU (Daniel Ahlberg)
Tue Feb 18 11:36:13 2003
From: Daniel Ahlberg <aliz@gentoo.org>
Date: Tue, 18 Feb 2003 10:10:15 +0100
To: bugtraq@securityfocus.com
Message-Id: <20030218090539.1304D33B58@mail1.tamperd.net>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200302-08
- - ---------------------------------------------------------------------
PACKAGE : nethack
SUMMARY : buffer overflow
DATE : 2003-02-18 09:10 UTC
EXPLOIT : local
- - ---------------------------------------------------------------------
Overflowing a buffer in nethack may lead to privelige escalation to
games uid.
Read the full advisory at:
http://marc.theaimsgroup.com/?l=bugtraq&m=104489201032144&w=2
SOLUTION
It is recommended that all Gentoo Linux users who are running
app-games/nethack upgrade to nethack-3.4.0-r6 as follows:
emerge sync
emerge -u nethack
emerge clean
- - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://cvs.gentoo.org/~aliz
- - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE+UfhsfT7nyhUpoZMRAhFfAJ9asnqYIFPxQ5x0NrI0TX95AoznHACgvDs3
IGHP5+mr6/l6VFSm1egWoNI=
=UKVa
-----END PGP SIGNATURE-----