Difference between revisions of "NetHack 3.6.5"

From NetHackWiki
Jump to navigation Jump to search
(Created page with "{{NetHack Versions}} '''NetHack 3.6.5''' is the 35th public release of NetHack. It was released on 27th January 2020. This release fixes several security exploits that ex...")
 
m
Line 1: Line 1:
 
{{NetHack Versions}}
 
{{NetHack Versions}}
  
'''NetHack 3.6.5''' is the 35th public release of [[NetHack]]. It was released on 27th January 2020. This release fixes several security exploits that existed in versions [[3.6.0]], [[3.6.1]], [[3.6.2]], [[3.6.3]] and [[3.6.4]], as well as some more minor bugs. There were no new gameplay features<ref>https://github.com/NetHack/NetHack/blob/NetHack-3.6/doc/fixes36.5</ref>.
+
'''NetHack 3.6.5''' is the 35th public release of [[NetHack]]. It was released on 27th January 2020. This release fixes several security exploits that existed in versions [[3.6.0]], [[3.6.1]], [[3.6.2]], [[3.6.3]] and [[3.6.4]], as well as some more minor bugs. There were no new gameplay features.<ref>https://github.com/NetHack/NetHack/blob/NetHack-3.6/doc/fixes36.5</ref>
  
 
== Availability ==
 
== Availability ==
Line 7: Line 7:
 
NetHack 3.6.5 is [https://nethack.org/v365/downloads.html available] from the official NetHack website.
 
NetHack 3.6.5 is [https://nethack.org/v365/downloads.html available] from the official NetHack website.
  
== Significant Changes ==
+
== Significant changes ==
  
 
=== Security ===
 
=== Security ===
Line 13: Line 13:
 
These security vulnerabilities were fixed:  
 
These security vulnerabilities were fixed:  
  
* CVE-2020-5209<ref>https://nethack.org/security/CVE-2020-5209.html</ref>: command line parsing of options starting with -de and -i is subject to a [https://en.wikipedia.org/wiki/Buffer_overflow buffer overflow ]
+
* CVE-2020-5209: command line parsing of options starting with -de and -i is subject to a [[wikipedia:buffer overflow|buffer overflow]]<ref>https://nethack.org/security/CVE-2020-5209.html</ref>
* CVE-2020-5210<ref>https://nethack.org/security/CVE-2020-5210.html</ref>: command line -w option parsing is subject to a buffer overflow  
+
* CVE-2020-5210: command line -w option parsing is subject to a buffer overflow<ref>https://nethack.org/security/CVE-2020-5210.html</ref>
* CVE-2020-5211<ref>https://nethack.org/security/CVE-2020-5211.html</ref>: [[Options#AUTOCOMPLETE|AUTOCOMPLETE]] configuration file option is subject to a buffer overflow
+
* CVE-2020-5211: [[Options#AUTOCOMPLETE|AUTOCOMPLETE]] configuration file option is subject to a buffer overflow<ref>https://nethack.org/security/CVE-2020-5211.html</ref>
* CVE-2020-5212<ref>https://nethack.org/security/CVE-2020-5212.html</ref>: [[Menucolors|MENUCOLOR]] configuration file option is subject to a buffer overflow
+
* CVE-2020-5212: [[Menucolors|MENUCOLOR]] configuration file option is subject to a buffer overflow<ref>https://nethack.org/security/CVE-2020-5212.html</ref>
* CVE-2020-5213<ref>https://nethack.org/security/CVE-2020-5213.html</ref>: [[Options#SYMBOL|SYMBOL]] configuration file option is subject to a buffer overflow
+
* CVE-2020-5213: [[Options#SYMBOL|SYMBOL]] configuration file option is subject to a buffer overflow<ref>https://nethack.org/security/CVE-2020-5213.html</ref>
* CVE-2020-5214<ref>https://nethack.org/security/CVE-2020-5214.html</ref>: error recovery after syntax error in configuration file is subject to a buffer overflow
+
* CVE-2020-5214: error recovery after syntax error in configuration file is subject to a buffer overflow<ref>https://nethack.org/security/CVE-2020-5214.html</ref>
  
 
These were all reported to the DevTeam by security researcher David Mendenhall.
 
These were all reported to the DevTeam by security researcher David Mendenhall.
Line 24: Line 24:
 
=== Bug fixes ===
 
=== Bug fixes ===
  
Other bug fixes include<ref>https://github.com/NetHack/NetHack/blob/NetHack-3.6/doc/fixes36.5</ref>:
+
Other bug fixes include:<ref>https://github.com/NetHack/NetHack/blob/NetHack-3.6/doc/fixes36.5</ref>
  
 
* fix accessing mons[-1] when trying to [[demon gating|gate]] in a non-valid demon
 
* fix accessing mons[-1] when trying to [[demon gating|gate]] in a non-valid demon

Revision as of 01:31, 31 January 2020

NetHack 3.6.5 is the 35th public release of NetHack. It was released on 27th January 2020. This release fixes several security exploits that existed in versions 3.6.0, 3.6.1, 3.6.2, 3.6.3 and 3.6.4, as well as some more minor bugs. There were no new gameplay features.[1]

Availability

NetHack 3.6.5 is available from the official NetHack website.

Significant changes

Security

These security vulnerabilities were fixed:

  • CVE-2020-5209: command line parsing of options starting with -de and -i is subject to a buffer overflow[2]
  • CVE-2020-5210: command line -w option parsing is subject to a buffer overflow[3]
  • CVE-2020-5211: AUTOCOMPLETE configuration file option is subject to a buffer overflow[4]
  • CVE-2020-5212: MENUCOLOR configuration file option is subject to a buffer overflow[5]
  • CVE-2020-5213: SYMBOL configuration file option is subject to a buffer overflow[6]
  • CVE-2020-5214: error recovery after syntax error in configuration file is subject to a buffer overflow[7]

These were all reported to the DevTeam by security researcher David Mendenhall.

Bug fixes

Other bug fixes include:[8]

  • fix accessing mons[-1] when trying to gate in a non-valid demon
  • fix accessing mons[-1] when monster figures out if a tin cures stoning
  • have string_for_opt() return empty_optstr on failure
  • ensure existing callers of string_for_opt() check return value before using it
  • use vsnprintf instead of vsprintf in pline.c where possible
  • Windows: includes a fix from a 3.6.4 post-release update where OPTIONS=map_mode:fit_to_screen could cause a game start failure
  • Windows: users with C-locale unmappable names could get game start failure

References