Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 23999 - app-games/xblockout
Summary: app-games/xblockout
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Highest critical (vote)
Assignee: Gentoo Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2003-07-06 13:38 UTC by Daniel Ahlberg (RETIRED)
Modified: 2011-10-30 22:39 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Daniel Ahlberg (RETIRED) gentoo-dev 2003-07-06 13:38:04 UTC
-------------------------------------------------------------------------- 
Debian Security Advisory DSA 327-1                     security@debian.org 
http://www.debian.org/security/                             Matt Zimmerman 
June 19th, 2003                         http://www.debian.org/security/faq 
-------------------------------------------------------------------------- 
 
Package        : xbl 
Vulnerability  : buffer overflows 
Problem-Type   : local 
Debian-specific: no 
 
Steve Kemp discovered several buffer overflows in xbl, a game, which 
can be triggered by long command line arguments.  This vulnerability 
could be exploited by a local attacker to gain gid 'games'.
Comment 1 Gerardo Di Giacomo 2003-10-06 08:52:36 UTC
It's impossible to emerge the current xblockout in the portage list because
the author has released a new version (1.1.2, not vulnerable) and has erased
the version that is in the ebuild (1.1.1).
Comment 2 SpanKY gentoo-dev 2003-10-06 09:19:07 UTC
1.1.2 is now in portage
Comment 3 Chris Gianelloni (RETIRED) gentoo-dev 2003-10-07 03:48:28 UTC
This looks to be resolved
Comment 4 solar (RETIRED) gentoo-dev 2003-10-11 13:11:04 UTC
changing resolution to FIXED