Debian Security Advisory
DSA-693-1 luxman -- buffer overflow
- Date Reported:
- 14 Mar 2005
- Affected Packages:
- luxman
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 12797.
In Mitre's CVE dictionary: CVE-2005-0385. - More information:
-
Kevin Finisterre discovered a buffer overflow in luxman, an SVGA based PacMan clone, that could lead to the execution of arbitrary commands as root.
For the stable distribution (woody) this problem has been fixed in version 0.41-17.2.
For the unstable distribution (sid) this problem has been fixed in version 0.41-20.
We recommend that you upgrade your luxman package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.dsc
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.diff.gz
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41.orig.tar.gz
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.diff.gz
- Intel IA-32:
- http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2_i386.deb
MD5 checksums of the listed files are available in the original advisory.