Debian Security Advisory

DSA-693-1 luxman -- buffer overflow

Date Reported:
14 Mar 2005
Affected Packages:
luxman
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 12797.
In Mitre's CVE dictionary: CVE-2005-0385.
More information:

Kevin Finisterre discovered a buffer overflow in luxman, an SVGA based PacMan clone, that could lead to the execution of arbitrary commands as root.

For the stable distribution (woody) this problem has been fixed in version 0.41-17.2.

For the unstable distribution (sid) this problem has been fixed in version 0.41-20.

We recommend that you upgrade your luxman package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.dsc
http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2.diff.gz
http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41.orig.tar.gz
Intel IA-32:
http://security.debian.org/pool/updates/main/l/luxman/luxman_0.41-17.2_i386.deb

MD5 checksums of the listed files are available in the original advisory.