DSA-929-1 petris -- buffer overflow

Related Vulnerabilities: CVE-2005-3540  

Steve Kemp from the Debian Security Audit project discovered a buffer overflow in petris, a clone of the Tetris game, which may be exploited to execute arbitrary code with group games privileges. The old stable distribution (woody) does not contain the petris package. For the stable distribution (sarge) this problem has been fixed in version 1.0.1-4sarge0. For the unstable distribution the package will be updated shortly. We recommend that you upgrade your petris package.

Debian Security Advisory

DSA-929-1 petris -- buffer overflow

Date Reported:
09 Jan 2006
Affected Packages:
petris
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2005-3540.
More information:

Steve Kemp from the Debian Security Audit project discovered a buffer overflow in petris, a clone of the Tetris game, which may be exploited to execute arbitrary code with group games privileges.

The old stable distribution (woody) does not contain the petris package.

For the stable distribution (sarge) this problem has been fixed in version 1.0.1-4sarge0.

For the unstable distribution the package will be updated shortly.

We recommend that you upgrade your petris package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0.diff.gz
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0.dsc
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_ia64.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/p/petris/petris_1.0.1-4sarge0_sparc.deb

MD5 checksums of the listed files are available in the original advisory.