Vulnerability Database
Blog
FAQ
Docs
DSA-316
See a problem?
Please try reporting it
to the source
first.
Source
https://security-tracker.debian.org/tracker/DSA-316
Import Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-316.json
JSON Data
https://api.osv.dev/v1/vulns/DSA-316
Related
CVE-2003-0358
CVE-2003-0359
Published
2003-06-11T00:00:00Z
Modified
2003-06-11T00:00:00Z
Summary
nethack - buffer overflow, incorrect permissions
Details
References
Affected packages
Debian:3.0
/
nethack
Package
Name
nethack
Purl
pkg:deb/debian/nethack?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
3.4.0-3.0woody3
Debian:3.0
/
slashem
Package
Name
slashem
Purl
pkg:deb/debian/slashem?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0.0.6E4F8-4.0woody3
DSA-316 - OSV