Debian Security Advisory

DSA-205-1 gtetrinet -- buffer overflow

Date Reported:
10 Dec 2002
Affected Packages:
Security database references:
No other external database security references currently available.
More information:

Steve Kemp and James Antill found several buffer overflows in the gtetrinet (a multiplayer tetris-like game) package as shipped in Debian GNU/Linux 3.0, which could be abused by a malicious server.

This has been fixed in upstream version 0.4.4 and release 0.4.1-9woody1.1 of the Debian package.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Debian GNU/Linux 3.0 (woody)

alpha (DEC Alpha):
arm (ARM):
hppa (HP PA RISC):
i386 (Intel ia32):
ia64 (Intel ia64):
m68k (Motorola Mc680x0):
mips (MIPS (Big Endian)):
mipsel (MIPS (Little Endian)):
powerpc (PowerPC):
s390 (IBM S/390):
sparc (Sun SPARC/UltraSPARC):

MD5 checksums of the listed files are available in the original advisory.