|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0077 (nethack)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0077: Updated nethack packages fix security vulnerabilities
Date:  Wed, 10 Feb 2021 19:42:52 +0100
Message-ID:  <20210210184253.1035E9F93B@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0077 - Updated nethack packages fix security vulnerabilities Publication date: 10 Feb 2021 URL: https://advisories.mageia.org/MGASA-2021-0077.html Type: security Affected Mageia releases: 7 CVE: CVE-2019-19905, CVE-2020-5209, CVE-2020-5210, CVE-2020-5211, CVE-2020-5212, CVE-2020-5213, CVE-2020-5214, CVE-2020-5254 Description: Updated nethack packages fix security vulnerabilities: NetHack 3.6.x before 3.6.4 is prone to a buffer overflow vulnerability when reading very long lines from configuration files. This affects systems that have NetHack installed suid/sgid, and shared systems that allow users to upload their own configuration files (CVE-2019-19905). In NetHack before 3.6.5, unknown options starting with -de and -i can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options (CVE-2020-5209). In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options (CVE-2020-5210). In NetHack before 3.6.5, an invalid extended command in value for the AUTOCOMPLETE configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5211). In NetHack before 3.6.5, an extremely long value for the MENUCOLOR configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5212). In NetHack before 3.6.5, too long of a value for the SYMBOL configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5213). In NetHack before 3.6.5, detecting an unknown configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5214). In NetHack before 3.6.6, some out-of-bound values for the hilite_status option can be exploited (CVE-2020-5254). The nethack package has been updated to version 3.6.6, fixing these issues and other bugs. See the upstream release notes for details. References: - https://bugs.mageia.org/show_bug.cgi?id=26228 - https://nethack.org/v362/release.html - https://nethack.org/v363/release.html - https://nethack.org/v364/release.html - https://nethack.org/v365/release.html - https://nethack.org/v366/release.html - https://www.nethack.org/security/CVE-2019-19905.html - https://www.nethack.org/security/CVE-2020-5209.html - https://www.nethack.org/security/CVE-2020-5210.html - https://www.nethack.org/security/CVE-2020-5211.html - https://www.nethack.org/security/CVE-2020-5212.html - https://www.nethack.org/security/CVE-2020-5213.html - https://www.nethack.org/security/CVE-2020-5214.html - https://www.nethack.org/security/CVE-2020-5254.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5209 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5210 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5211 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5212 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5213 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5214 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5254 SRPMS: - 7/core/nethack-3.6.6-1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds