tintin++ 2.01.5-2 source package in Debian

Changelog

tintin++ (2.01.5-2) unstable; urgency=high

  * Add security patch - backport fix of the following security bug:
  - CVE-2019-7629:
    Stack-based buffer overflow in the strip_vt102_codes function allows
    remote attackers to execute arbitrary code by sending a long message
    to the client.
    (Closes: #924348)

 -- Jozsef Nagy <email address hidden>  Thu, 14 Mar 2019 20:27:42 +0100

Upload details

Uploaded by:
Jozsef Nagy
Uploaded to:
Sid
Original maintainer:
Jozsef Nagy
Architectures:
any
Section:
games
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section
Buster release main games

Builds

Downloads

File Size SHA-256 Checksum
tintin++_2.01.5-2.dsc 1.7 KiB 42e95fcc6c99faae1577db77686dae023b748d5eebe368aca00f94e2fcef16c0
tintin++_2.01.5.orig.tar.gz 289.2 KiB bd330c45bcc200b9edd1df5ab85995999870f7cdc8145446327275932a5bd65e
tintin++_2.01.5-2.debian.tar.xz 20.2 KiB b8c4dbaa957e8a97768a3e3e918fcb6eb33a871a74994b4c576157095fd449d3

Available diffs

No changes file available.

Binary packages built by this source