CVE-2020-5209

NameCVE-2020-5209
DescriptionIn NetHack before 3.6.5, unknown options starting with -de and -i can cause a buffer overflow resulting in a crash or remote code execution/privilege escalation. This vulnerability affects systems that have NetHack installed suid/sgid and shared systems that allow users to influence command line options. Users should upgrade to NetHack 3.6.5.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nethack (PTS)jessie3.4.3-15vulnerable
stretch3.6.0-4vulnerable
buster3.6.1-1vulnerable
bullseye3.6.6-2fixed
bookworm3.6.6-3fixed
sid, trixie3.6.7-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nethacksourcewheezy(unfixed)end-of-life
nethacksource(unstable)3.6.6-1unimportant

Notes

https://github.com/NetHack/NetHack/security/advisories/GHSA-fw72-r8xm-45p8
https://github.com/NetHack/NetHack/commit/f3def5c0b999478da2d0a8f0b6a7c370a2065f77
Negligible security impact

Search for package or bug name: Reporting problems