Nicolas Boullis discovered two vulnerabilities in mah-jong, a network-enabled game.
This vulnerability could be exploited by a remote attacker to execute arbitrary code with the privileges of the user running the mah-jong server.
This vulnerability could be exploited by a remote attacker to cause the mah-jong server to enter a tight loop and stop responding to commands.
For the stable distribution (woody) these problems have been fixed in version 1.4-2.
For the unstable distribution (sid) these problems have been fixed in version 1.5.6-2.
We recommend that you update your mah-jong package.
MD5 checksums of the listed files are available in the original advisory.