[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20170819124256.53hamf6xtce2gtkh@pisco.westfalen.local>
Date: Sat, 19 Aug 2017 14:42:56 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3948-1] ioquake3 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3948-1 security@...ian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 19, 2017 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ioquake3
CVE ID : CVE-2017-11721
A read buffer overflow was discovered in the idtech3 (Quake III Arena)
family of game engines. This allows remote attackers to cause a denial
of service (application crash) or possibly have unspecified other impact
via a crafted packet.
For the oldstable distribution (jessie), this problem has been fixed
in version 1.36+u20140802+gca9eebb-2+deb8u2.
For the stable distribution (stretch), this problem has been fixed in
version 1.36+u20161101+dfsg1-2+deb9u1.
We recommend that you upgrade your ioquake3 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlmYMfEACgkQEMKTtsN8
Tjb26g/+IGz1bUQAAqStteModcPbIm0xu/4VOJMS61nU6n2zSpJcTlfIz9kGDiWH
KloSbW3mB0pZ096k71z/YISUW2j53OzykiD1RwtMClO868p3NLFj9KL2P5xxlHHS
2q5anuyaR/2k3iMNfq318rohmF3v1LnFVOtW5MPI+hzGhqOjmMFP7WjFl1VrRjnz
/QCHoZyc1m8EE3pde2rIRJjZm72zbKMVepnXhIsMl+hbRAHWKsq+gPmmBEGtybVL
tmXTaL/Q6Hh68x3j61/MHW1Ym77WydfyQ0f9gOjJuuijZXPPnSanTtNNDRccKDTu
oS/66k59sFpJM9rXhcI4bZIezBgYljNCpIWZ0u7TSMVSw1kT4ZGOBacXmC71Baf9
6/5sSpi6tcd1HbgyOVO3G0aQ3TGGgAzi3v6i7FAawHhH8HpAHELoB5Ln8SZjtqkN
XzIwsegqzX7E05n6WXjdnIzxJiNc7rRRVcOUalEnbW6n3dRME4f3RerkO1p8XpFR
i6+/5hLo00fPjOdJ9HVdKkqnPP+uHxM6qmJigr4UJHFcKXgKVKADP79mevUJXqsM
/mujlue9D42aTD8+VvtUladHM/9mZf7IWvHT+eBk4p2aDLwfnC3RAAxyr46nyiMg
maBDIeth8zSATz4MJZ4DC6lI5YqmzskJej4XfHE8oKkBKH7imT0=
=XBZw
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists