Fedora has issued an advisory on February 8: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/VDMTLPNMUSRGT7QWFBGZW3OWHG3BCBOF/ It doesn't specify the security issue(s) fixed in 3.6.5.
Status comment: (none) => Fixed upstream in 3.6.5
Done for mga7!
CC: (none) => geiger.david68210
Advisory: ======================== Updated nethack packages fix security vulnerabilities: NetHack 3.6.x before 3.6.4 is prone to a buffer overflow vulnerability when reading very long lines from configuration files. This affects systems that have NetHack installed suid/sgid, and shared systems that allow users to upload their own configuration files (CVE-2019-19905). In NetHack before 3.6.5, unknown options starting with -de and -i can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options (CVE-2020-5209). In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options (CVE-2020-5210). In NetHack before 3.6.5, an invalid extended command in value for the AUTOCOMPLETE configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5211). In NetHack before 3.6.5, an extremely long value for the MENUCOLOR configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5212). In NetHack before 3.6.5, too long of a value for the SYMBOL configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5213). In NetHack before 3.6.5, detecting an unknown configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5214). The nethack package has been updated to version 3.6.5, fixing these issues and other bugs. See the upstream release notes for details. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19905 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5209 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5210 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5211 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5212 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5213 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5214 https://www.nethack.org/security/CVE-2019-19905.html https://www.nethack.org/security/CVE-2020-5209.html https://www.nethack.org/security/CVE-2020-5210.html https://www.nethack.org/security/CVE-2020-5211.html https://www.nethack.org/security/CVE-2020-5212.html https://www.nethack.org/security/CVE-2020-5213.html https://www.nethack.org/security/CVE-2020-5214.html https://nethack.org/v362/release.html https://nethack.org/v363/release.html https://nethack.org/v364/release.html https://nethack.org/v365/release.html ======================== Updated packages in core/updates_testing: ======================== nethack-3.6.5-1.mga7 nethack-bitmap-fonts-3.6.5-1.mga7 nethack-bitmap-fonts-core-3.6.5-1.mga7 from nethack-3.6.5-1.mga7.src.rpm
Assignee: shlomif => qa-bugsStatus comment: Fixed upstream in 3.6.5 => (none)
MGA7-64 Plasma on Lenovo B50 No apparent installation issues, but $ nethack Warning: cannot write scoreboard file '/var/games/nethack/record' Unable to open SYSCF_FILE. Checked:the /var/games/ folder is empty. Checked in MCC the contents of the packages :none of them contain anything in /var, and what is more: the flilelist of nethack-bitmap-fonts-core-3.6.5-1.mga7 is empty????
CC: (none) => herman.viaene
CC: (none) => tmbKeywords: (none) => advisory
Fedora has issued an advisory on March 19: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LYC5LEWKB2NA46IOI6GGAUMFK5SR3KQ6/ It fixes CVE-2020-5254, fixed upstream in 3.6.6: https://www.nethack.org/security/CVE-2020-5254.html https://nethack.org/v366/release.html
CC: (none) => qa-bugsKeywords: advisory => (none)Assignee: qa-bugs => geiger.david68210Summary: nethack new security issue(s) fixed upstream in 3.6.5 => nethack new security issue(s) fixed upstream in 3.6.6
Done for both Cauldron and mga7!
Advisory: ======================== Updated nethack packages fix security vulnerabilities: NetHack 3.6.x before 3.6.4 is prone to a buffer overflow vulnerability when reading very long lines from configuration files. This affects systems that have NetHack installed suid/sgid, and shared systems that allow users to upload their own configuration files (CVE-2019-19905). In NetHack before 3.6.5, unknown options starting with -de and -i can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options (CVE-2020-5209). In NetHack before 3.6.5, an invalid argument to the -w command line option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options (CVE-2020-5210). In NetHack before 3.6.5, an invalid extended command in value for the AUTOCOMPLETE configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5211). In NetHack before 3.6.5, an extremely long value for the MENUCOLOR configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5212). In NetHack before 3.6.5, too long of a value for the SYMBOL configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5213). In NetHack before 3.6.5, detecting an unknown configuration file option can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to upload their own configuration files (CVE-2020-5214). In NetHack before 3.6.6, some out-of-bound values for the hilite_status option can be exploited (CVE-2020-5254). The nethack package has been updated to version 3.6.6, fixing these issues and other bugs. See the upstream release notes for details. References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19905 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5209 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5210 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5211 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5212 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5213 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5214 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5254 https://www.nethack.org/security/CVE-2019-19905.html https://www.nethack.org/security/CVE-2020-5209.html https://www.nethack.org/security/CVE-2020-5210.html https://www.nethack.org/security/CVE-2020-5211.html https://www.nethack.org/security/CVE-2020-5212.html https://www.nethack.org/security/CVE-2020-5213.html https://www.nethack.org/security/CVE-2020-5214.html https://www.nethack.org/security/CVE-2020-5254.html https://nethack.org/v362/release.html https://nethack.org/v363/release.html https://nethack.org/v364/release.html https://nethack.org/v365/release.html https://nethack.org/v366/release.html ======================== Updated packages in core/updates_testing: ======================== nethack-3.6.6-1.mga7 nethack-bitmap-fonts-3.6.6-1.mga7 nethack-bitmap-fonts-core-3.6.6-1.mga7 from nethack-3.6.6-1.mga7.src.rpm
CC: qa-bugs => (none)Assignee: geiger.david68210 => qa-bugs
This version behaves exactly the same as the 3.6.5 in Comment 3.
Keywords: (none) => advisory
After installation some nethack fonts appear in /usr/share/fonts/nethack-bitmap and nethack appears in the system games menu. Documentation is available, but that is as far as it goes; on launch something flashes up on the screen momentarily, literally for a split second, probably the logo, then nothing. From the command-line it is just as Herman reports in comment 3. Something is lacking.
CC: (none) => tarazed25
Permissions are a mess. To get it to run ... # mkdir -p /var/games/nethack/record # chgrp games /var/games/nethack # chmod g+w /var/games/nethack # chmod a+r /usr/games/lib/nethackdir/* # touch /var/games/nethack/perm # chmod g+rw /var/games/nethack/perm After that, I was able to complete the first level, though after quiting there were a couple of additional messages ... Cannot open file /var/games/nethack/logfile. Is NetHack installed correctly? Cannot open file /var/games/nethack/xlogfile. Is NetHack installed correctly? My id is a member of the games group.
CC: (none) => davidwhodgins
Keywords: (none) => feedback
Thanks for stepping in Dave. Had to add games group to perm file before it would start. Looks like it works after all that but could not play it on my 4K screen. The field measured 23mmx13mm. No way to enlarge it. Had to use a hand-held video magnifier to recognize the little dog.
lol. Very long time since I played hack, or it's predecessor rogue. It still seems to be based on the design for a cga monitor.
This package needs some work, apparently. Assigning back to the maintainer.
Assignee: qa-bugs => shlomifCC: (none) => qa-bugsKeywords: advisory, feedback => (none)
(In reply to David Walser from comment #12) > This package needs some work, apparently. Assigning back to the maintainer. Hi all! I'd like to note that I prepared new source and binary packages of nethack in mageia cauldron/updates-testing. I basically made the package much closer to Fedora Rawhide's one ("imitation is the sincerest form of flattery"). This seems to run fine, so please test it.
(In reply to Shlomi Fish from comment #13) > (In reply to David Walser from comment #12) > > This package needs some work, apparently. Assigning back to the maintainer. > > Hi all! > > I'd like to note that I prepared new source and binary packages of nethack > in mageia cauldron/updates-testing. I basically made the package much closer > to Fedora Rawhide's one ("imitation is the sincerest form of flattery"). > This seems to run fine, so please test it. This was now pushed as 3.6.6-4 into cauldron core/release by "tv" and myself.
Assignee: shlomif => pkg-bugs
Status comment: (none) => Needs to be synced with Cauldron
Status comment: Needs to be synced with Cauldron => (none)Assignee: pkg-bugs => qa-bugs
Advisory and package list in Comment 6.
Keywords: feedback => (none)
Installed the non-updated packages, tried to run it without the manipulations described in Comment 9, with the same result others have seen. No update installation issues, after which I tried to run again, still without the manipulations. This time a terminal window came up, asking me if I wanted the game to choose my character. I went with yes, and was transformed into a human female healer. Not a good fit, so I asked to change. This time I selected for myself, choosing to be a lawful male human knight. Play began, and I got nowhere. I may have played a version of Rogue in the past, but it would have been last century, and I have forgotten more than I ever learned about playing. I found the handbook in the docs and read some of it (a lot of work went into that), but decided that it was too much to learn at this time. At any rate, it seems to be working as designed. Giving it an OK, and validating. Advisory in Comment 6.
Keywords: (none) => validated_updateWhiteboard: (none) => MGA7-64-OKCC: (none) => andrewsfarm, sysadmin-bugs
This already have an advisory. Adding keyword.
CC: (none) => ouaurelienKeywords: (none) => advisory
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2021-0077.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED