tintin++ 2.01.5-2 source package in Debian
Changelog
tintin++ (2.01.5-2) unstable; urgency=high * Add security patch - backport fix of the following security bug: - CVE-2019-7629: Stack-based buffer overflow in the strip_vt102_codes function allows remote attackers to execute arbitrary code by sending a long message to the client. (Closes: #924348) -- Jozsef Nagy <email address hidden> Thu, 14 Mar 2019 20:27:42 +0100
Upload details
- Uploaded by:
- Jozsef Nagy
- Uploaded to:
- Sid
- Original maintainer:
- Jozsef Nagy
- Architectures:
- any
- Section:
- games
- Urgency:
- Very Urgent
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Buster | release | main | games |
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
tintin++_2.01.5-2.dsc | 1.7 KiB | 42e95fcc6c99faae1577db77686dae023b748d5eebe368aca00f94e2fcef16c0 |
tintin++_2.01.5.orig.tar.gz | 289.2 KiB | bd330c45bcc200b9edd1df5ab85995999870f7cdc8145446327275932a5bd65e |
tintin++_2.01.5-2.debian.tar.xz | 20.2 KiB | b8c4dbaa957e8a97768a3e3e918fcb6eb33a871a74994b4c576157095fd449d3 |
Available diffs
- diff from 2.01.5-1 to 2.01.5-2 (1.3 KiB)
No changes file available.