From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from lists.gentoo.org ([140.105.134.102] helo=robin.gentoo.org) by nuthatch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1GKzXF-0005zj-O4 for garchives@archives.gentoo.org; Wed, 06 Sep 2006 15:41:54 +0000 Received: from robin.gentoo.org (localhost [127.0.0.1]) by robin.gentoo.org (8.13.8/8.13.6) with SMTP id k86Fdlcs029054; Wed, 6 Sep 2006 15:39:47 GMT Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by robin.gentoo.org (8.13.8/8.13.6) with ESMTP id k86FIc9o013455 for ; Wed, 6 Sep 2006 15:18:38 GMT Received: from localhost (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id 1ADD56454A for ; Wed, 6 Sep 2006 15:18:38 +0000 (UTC) Received: from smtp.gentoo.org ([127.0.0.1]) by localhost (smtp.gentoo.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 02643-15 for ; Wed, 6 Sep 2006 15:18:31 +0000 (UTC) Received: from pfepb.post.tele.dk (pfepb.post.tele.dk [195.41.46.236]) by smtp.gentoo.org (Postfix) with ESMTP id A590064298 for ; Wed, 6 Sep 2006 15:18:30 +0000 (UTC) Received: from dustyboots.home.coming.dk (unknown [83.88.175.88]) by pfepb.post.tele.dk (Postfix) with ESMTP id 620AEA5003F; Wed, 6 Sep 2006 17:18:12 +0200 (CEST) From: Sune Kloppenborg Jeppesen To: gentoo-announce@lists.gentoo.org Subject: [gentoo-announce] [ GLSA 200609-02 ] GTetrinet: Remote code execution Date: Wed, 6 Sep 2006 17:18:12 +0200 User-Agent: KMail/1.9.1 Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk, security-alerts@linuxsecurity.com Organization: Gentoo Linux Security Team X-GPG-Key: http://home.coming.dk/skj.pub.gpg Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@gentoo.org MIME-Version: 1.0 Content-Type: multipart/signed; boundary="nextPart1742842.VQzdGeE0kp"; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-Transfer-Encoding: 7bit Message-Id: <200609061718.13135.jaervosz@gentoo.org> X-Virus-Scanned: amavisd-new at gentoo.org X-Spam-Status: No, score=-2.331 required=5.5 tests=[AWL=0.268, BAYES_00=-2.599] X-Spam-Score: -2.331 X-Spam-Level: X-Archives-Salt: adbcd76d-5712-4d31-a454-3fea8e1d1960 X-Archives-Hash: 08fc208719bbd45079d72c35c8e62378 --nextPart1742842.VQzdGeE0kp Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Content-Disposition: inline - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: GTetrinet: Remote code execution Date: September 06, 2006 Bugs: #144867 ID: 200609-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== GTetrinet is vulnerable to a remote buffer overflow, potentially leading to arbitrary code execution. Background ========== GTetrinet is a networked Tetris clone for GNOME 2. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 games-puzzle/gtetrinet < 0.7.9 >= 0.7.9 Description =========== Michael Gehring has found that GTetrinet fails to properly handle array indexes. Impact ====== An attacker can potentially execute arbitrary code by sending a negative number of players to the server. Workaround ========== There is no known workaround at this time. Resolution ========== All GTetrinet users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=games-puzzle/gtetrinet-0.7.9" References ========== [ 1 ] CVE-2006-3125 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3125 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200609-02.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --nextPart1742842.VQzdGeE0kp Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQBE/ua1zKC5hMHO6rkRAuN3AJ9Bu+t0RyTYY2Kx0vyl2DB+pnWM9gCfe5KC CK5QhTgF+9STS6QS95THfTc= =lOvN -----END PGP SIGNATURE----- --nextPart1742842.VQzdGeE0kp-- -- gentoo-announce@gentoo.org mailing list