Alerta de Segurança Debian
DSA-1036-1 bsdgames -- estouro de pilha
- Data do Alerta:
- 17 Abr 2006
- Pacotes Afetados:
- bsdgames
- Vulnerável:
- Sim
- Referência à base de dados de segurança:
- No sistema de acompanhamento de bugs do Debian: Bug 360989.
Na base de dados do BugTraq (na SecurityFocus): ID BugTraq 17401.
No dicionário CVE do Mitre: CVE-2006-1744. - Informações adicionais:
-
Um problema de estouro de pilha foi descoberto no sail, um jogo contido no pacote bsdgames, uma coleção de jogos em modo texto clássicos para Unix, que pode levar à elevação de privilégios do grupo games.
Para a antiga distribuição estável ("woody") este problema foi corrigido na versão 2.13-7woody0.
Para a distribuição estável ("sarge") este problema foi corrigido na versão 2.17-1sarge1.
Para a distribuição instável ("sid") este problema foi corrigido na versão 2.17-7.
Recomendamos que você atualize seu pacote bsdgames.
- Corrigido em:
-
Debian GNU/Linux 3.0 (woody)
- Fonte:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0.dsc
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0.diff.gz
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13.orig.tar.gz
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.13-7woody0_sparc.deb
Debian GNU/Linux 3.1 (sarge)
- Fonte:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1.dsc
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1.diff.gz
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17.orig.tar.gz
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/b/bsdgames/bsdgames_2.17-1sarge1_sparc.deb
Checksums MD5 dos arquivos listados estão disponíveis no alerta original.