-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3948-1 security@xxxxxxxxxx https://www.debian.org/security/ Moritz Muehlenhoff August 19, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ioquake3 CVE ID : CVE-2017-11721 A read buffer overflow was discovered in the idtech3 (Quake III Arena) family of game engines. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted packet. For the oldstable distribution (jessie), this problem has been fixed in version 1.36+u20140802+gca9eebb-2+deb8u2. For the stable distribution (stretch), this problem has been fixed in version 1.36+u20161101+dfsg1-2+deb9u1. We recommend that you upgrade your ioquake3 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlmYMfEACgkQEMKTtsN8 Tjb26g/+IGz1bUQAAqStteModcPbIm0xu/4VOJMS61nU6n2zSpJcTlfIz9kGDiWH KloSbW3mB0pZ096k71z/YISUW2j53OzykiD1RwtMClO868p3NLFj9KL2P5xxlHHS 2q5anuyaR/2k3iMNfq318rohmF3v1LnFVOtW5MPI+hzGhqOjmMFP7WjFl1VrRjnz /QCHoZyc1m8EE3pde2rIRJjZm72zbKMVepnXhIsMl+hbRAHWKsq+gPmmBEGtybVL tmXTaL/Q6Hh68x3j61/MHW1Ym77WydfyQ0f9gOjJuuijZXPPnSanTtNNDRccKDTu oS/66k59sFpJM9rXhcI4bZIezBgYljNCpIWZ0u7TSMVSw1kT4ZGOBacXmC71Baf9 6/5sSpi6tcd1HbgyOVO3G0aQ3TGGgAzi3v6i7FAawHhH8HpAHELoB5Ln8SZjtqkN XzIwsegqzX7E05n6WXjdnIzxJiNc7rRRVcOUalEnbW6n3dRME4f3RerkO1p8XpFR i6+/5hLo00fPjOdJ9HVdKkqnPP+uHxM6qmJigr4UJHFcKXgKVKADP79mevUJXqsM /mujlue9D42aTD8+VvtUladHM/9mZf7IWvHT+eBk4p2aDLwfnC3RAAxyr46nyiMg maBDIeth8zSATz4MJZ4DC6lI5YqmzskJej4XfHE8oKkBKH7imT0= =XBZw -----END PGP SIGNATURE-----