Bug#1031869: nethack: CVE-2023-24809
Moritz Mühlenhoff
jmm at inutil.org
Fri Feb 24 15:59:19 GMT 2023
Source: nethack
X-Debbugs-CC: team at security.debian.org
Severity: important
Tags: security
Hi,
The following vulnerability was published for nethack.
CVE-2023-24809[0]:
| NetHack is a single player dungeon exploration game. Starting with
| version 3.6.2 and prior to version 3.6.7, illegal input to the "C"
| (call) command can cause a buffer overflow and crash the NetHack
| process. This vulnerability may be a security issue for systems that
| have NetHack installed suid/sgid and for shared systems. For all
| systems, it may result in a process crash. This issue is resolved in
| NetHack 3.6.7. There are no known workarounds.
https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w
https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf (v5.19.1)
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2023-24809
https://www.cve.org/CVERecord?id=CVE-2023-24809
Please adjust the affected versions in the BTS as needed.
More information about the Pkg-games-devel
mailing list