Your message dated Sun, 31 May 2020 17:49:17 +0000
with message-id <e1jfs5f-000h03...@fasolo.debian.org>
and subject line Bug#947005: fixed in nethack 3.6.6-1
has caused the Debian Bug report #947005,
regarding nethack: CVE-2019-19905: buffer overflow when parsing config files
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
947005: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947005
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: nethack
Version: 3.6.0-1
Severity: grave
Tags: security
X-Debbugs-Cc: t...@security.debian.org

Hi,

a new version of NetHack has been released that fixes a privilege
escalation issue introduced in 3.6.0 [0] [1]:

> A buffer overflow issue exists when reading very long lines from a
> NetHack configuration file (usually named .nethackrc).
> 
> This vulnerability affects systems that have NetHack installed suid/sgid
> and shared systems that allow users to upload their own configuration
> files.
> 
> All users are urged to upgrade to NetHack 3.6.4 as soon as possible. 

As the Debian packages ship setgid binaries, I think they are affected by it.

At least these two commits look related:
 https://github.com/NetHack/NetHack/commit/f4a840a
 https://github.com/NetHack/NetHack/commit/f001de7

Regards,
  Reiner

[0] https://nethack.org/security/index.html
[1] https://nethack.org/v364/release.html

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: nethack
Source-Version: 3.6.6-1
Done: Markus Koschany <a...@debian.org>

We believe that the bug you reported is fixed in the latest version of
nethack, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 947...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Markus Koschany <a...@debian.org> (supplier of updated nethack package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 31 May 2020 18:57:45 +0200
Source: nethack
Architecture: source
Version: 3.6.6-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Games Team <pkg-games-de...@lists.alioth.debian.org>
Changed-By: Markus Koschany <a...@debian.org>
Closes: 947005 953978 957598
Changes:
 nethack (3.6.6-1) unstable; urgency=medium
 .
   * Team upload.
 .
   [ Reiner Herrmann ]
   * Update watch file.
     The sourceforge page seem to be no longer kept up-to-date.
     Use the official site instead, but mangle the page a bit,
     to point to the correct tarball location.
 .
   [ Markus Koschany ]
   * New upstream version 3.6.6.
     - Fixes CVE-2020-5254, CVE-2020-5214, CVE-2020-5213, CVE-2020-5212,
       CVE-2020-5211, CVE-2020-5210, CVE-2020-5209 and CVE-2019-19905.
       (Closes: #947005, #953978)
   * Fixes FTBFS with GCC 10. (Closes: #957598)
   * Switch to debhelper-compat = 13
   * Declare compliance with Debian Policy 4.5.0.
   * Drop u1-fix-H7138-sys-unix-setup.sh-fails-with-no-arguments.patch.
     Fixed upstream.
   * Rebase all patches for new version 3.6.6.
   * Remove all lisp patches. Broken and unmaintained with 3.6.6.
     Maintainers are welcome. nethack-lisp can be salvaged by fixing the errors
     on the lisp branch in Git. If they are not fixed before the bullseye
     release nethack-lisp will be removed.
Checksums-Sha1:
 d5659ae7da59e1a9947f0b5fe0c4415f5a9deb6e 2433 nethack_3.6.6-1.dsc
 d425d447892157c2efa612e31d02a062e72040e2 5577633 nethack_3.6.6.orig.tar.gz
 9752bd9177e6cb0cc0c216ccebc4ae81ee97a767 49608 nethack_3.6.6-1.debian.tar.xz
 2d07c0841e16da9490db4a4e778fba460819f01d 8572 nethack_3.6.6-1_amd64.buildinfo
Checksums-Sha256:
 0fe55067dbd878615c1f4b04a3d1898a452fb306b205baac8e7d0f1c1bee0367 2433 
nethack_3.6.6-1.dsc
 cfde0c3ab6dd7c22ae82e1e5a59ab80152304eb23fb06e3129439271e5643ed2 5577633 
nethack_3.6.6.orig.tar.gz
 92404b459d929698ab36729d15473b2f46e26a93f91ca7496a5c8bef7a885168 49608 
nethack_3.6.6-1.debian.tar.xz
 897ff26e28299e9ea3ae183f45e32f32833dfc8ea8b8137cf09ba7881719654b 8572 
nethack_3.6.6-1_amd64.buildinfo
Files:
 841c989a12e22b427e480a0a2bea2d58 2433 games optional nethack_3.6.6-1.dsc
 6c9a75f556d24c66801d74d8727a602e 5577633 games optional 
nethack_3.6.6.orig.tar.gz
 9df770eba517625b38eac596bee1fcb5 49608 games optional 
nethack_3.6.6-1.debian.tar.xz
 606470a4fa6b304b8151655572dde74b 8572 games optional 
nethack_3.6.6-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAl7T58pfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD
RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp
YW4ub3JnAAoJENmtFLlRO1HkbAQP/3G4YIhonS0Brk3xJxVZn6V53z7GVVleWInq
ijn0+8IsGzEoUoBDTJJ101tAZOcQ2JOY8ZmNWOE163mPq0uiKyxv+kbD54SpGlBX
hsjX5GhA5U7Rl3Oi+84Oe1TF3js3bjKAGLH2XyO7W7m7uHktFj6J6okNs6uqElDa
HWo7g0wEDfZn9yFvE7VwN9i3O/Jm7m/3lWa1RrEXTalCZfLhQjvHC8ehb+pqep3/
E90hCofATv6SvuHfvBr84KxcmbruAtn3UDtrwkRcrJNeghdIgbv9cLqov6+AY/NO
JOwzvkxKFOUxkScG6wy0IV08gCNXnKabRJxLFnr1SRM6OSZA+w0Ghx7F8bLavZqR
5/sRTPQq0toS/AuU3KNx7DzN1SfO6Bma5hXkHEOdWeqFAx3oJDZP8OtIHqSuyl5m
4U8Cbrb8PaK4xCuiEZEiXHKO+qYaq5yPuAdRztirL7k7l/fNyz7YeLqA8uq/8tMb
QK6aJwmHozV+aWjfT3ROHBwLfl/bZgazUOGYRsTN9EIwY5ub1axKaAhI7OcXHMid
cgg2Zvhy2rkHovjnucc9eP1D7KG52sGfzawm6wAxjIb6OMz1kzUyeKwgy9ePb/yJ
zh+5kJbPwP6NXYr6PlyfEuRG3WtKJT5gumqRGaF0NUcf3Qw/DruPuFkg2NPUMmOv
GaufLwso
=ArIg
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to