[SCM] team based FPS game - packaging branch, debian, updated. debian/1.1.0-5-4-gdb361a5

Simon McVittie smcv at debian.org
Wed Feb 22 09:40:39 UTC 2012


The following commit has been merged in the debian branch:
commit db361a5b7c69e3ac3ae9b54558abaad15a5e4a66
Author: Simon McVittie <smcv at debian.org>
Date:   Wed Feb 22 09:12:17 2012 +0000

    Add bug numbers, release

diff --git a/debian/NEWS b/debian/NEWS
index 1a9d26b..50eaafc 100644
--- a/debian/NEWS
+++ b/debian/NEWS
@@ -1,4 +1,4 @@
-tremulous (1.1.0-6) UNRELEASED; urgency=medium
+tremulous (1.1.0-6) unstable; urgency=medium
 
   This version of Tremulous is based on an older version of the Quake III
   Arena engine, which has no protection against malicious bytecode programs.
diff --git a/debian/changelog b/debian/changelog
index e031bd6..410c7a3 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,25 +1,27 @@
-tremulous (1.1.0-6) UNRELEASED; urgency=medium
+tremulous (1.1.0-6) unstable; urgency=medium
 
   * Backport patches from ioquake3 to fix long-standing security bugs:
     - CVE-2006-2082: arbitrary file download from server by a malicious client
+      (Closes: #660831)
     - CVE-2006-2236 ("the remapShader exploit"): missing bounds-checking on
       COM_StripExtension, exploitable in clients of a malicious server
+      (Closes: #660827)
     - CVE-2006-2875 ("q3cbof"): buffer overflow in CL_ParseDownload by a
-      malicious server
+      malicious server (Closes: #660830)
     - CVE-2006-3324: arbitrary file overwriting in clients of a malicious
-      server
+      server (Closes: #660832)
     - CVE-2006-3325: arbitrary cvar overwriting (could lead to arbitrary
-      code execution) in clients of a malicious server
+      code execution) in clients of a malicious server (Closes: #660835)
     - CVE-2011-3012, CVE-2011-2764: DLL overwriting (leading to arbitrary
       code execution) in clients of a malicious server if auto-downloading
-      is enabled
+      is enabled (Closes: #660836)
   * As a precaution, disable auto-downloading
   * Backport ioquake3 r1141 to fix a potential buffer overflow in error
     handling (not known to be exploitable, but it can't hurt)
   * Add gcc attributes to all printf- and scanf-like functions, and
     fix non-literal format strings (again, none are known to be exploitable)
 
- -- Simon McVittie <smcv at debian.org>  Sun, 11 Dec 2011 17:35:38 +0000
+ -- Simon McVittie <smcv at debian.org>  Wed, 22 Feb 2012 09:07:37 +0000
 
 tremulous (1.1.0-5) unstable; urgency=low
 
diff --git a/debian/patches/0010-CVE-2006-2082-do-not-allow-download-of-arbitrary-fil.patch b/debian/patches/0010-CVE-2006-2082-do-not-allow-download-of-arbitrary-fil.patch
index a41f689..8c42baa 100644
--- a/debian/patches/0010-CVE-2006-2082-do-not-allow-download-of-arbitrary-fil.patch
+++ b/debian/patches/0010-CVE-2006-2082-do-not-allow-download-of-arbitrary-fil.patch
@@ -10,6 +10,7 @@ vulnerability) and r781 (which fixed a regression in r777 where
 uninitialized variables led to some allowed downloads being rejected too).
 
 Origin: backport
+Bug-Debian: http://bugs.debian.org/660831
 Bug-CVE: http://security-tracker.debian.org/tracker/CVE-2006-2082
 ---
  src/server/sv_client.c |   51 ++++++++++++++++++++++++++++++++++++++++-------
diff --git a/debian/patches/0011-CVE-2006-2236-add-bounds-checking-to-COM_StripExtens.patch b/debian/patches/0011-CVE-2006-2236-add-bounds-checking-to-COM_StripExtens.patch
index 0819d5f..b59c83f 100644
--- a/debian/patches/0011-CVE-2006-2236-add-bounds-checking-to-COM_StripExtens.patch
+++ b/debian/patches/0011-CVE-2006-2236-add-bounds-checking-to-COM_StripExtens.patch
@@ -7,6 +7,7 @@ a further change to avoid strncpy'ing a string into itself.
 Original patch by Thilo Schulz.
 
 Origin: backport
+Bug-Debian: http://bugs.debian.org/660827
 Bug-CVE: http://security-tracker.debian.org/tracker/CVE-2006-2236
 Bug-Fedora: https://bugzilla.redhat.com/show_bug.cgi?id=455458
 ---
diff --git a/debian/patches/0012-CVE-2006-2875-fix-stack-buffer-overflow-in-CL_ParseD.patch b/debian/patches/0012-CVE-2006-2875-fix-stack-buffer-overflow-in-CL_ParseD.patch
index 12f9c78..319978b 100644
--- a/debian/patches/0012-CVE-2006-2875-fix-stack-buffer-overflow-in-CL_ParseD.patch
+++ b/debian/patches/0012-CVE-2006-2875-fix-stack-buffer-overflow-in-CL_ParseD.patch
@@ -6,6 +6,7 @@ This is exploitable by a modified server. Original patch by Thilo
 Schulz, ioquake3 r796.
 
 Origin: backport
+Bug-Debian: http://bugs.debian.org/660830
 Bug-CVE: http://security-tracker.debian.org/tracker/CVE-2006-2875
 ---
  src/client/cl_parse.c |   28 ++++++++++++++++++++--------
diff --git a/debian/patches/0013-CVE-2006-3324-fix-arbitrary-file-overwrite-on-client.patch b/debian/patches/0013-CVE-2006-3324-fix-arbitrary-file-overwrite-on-client.patch
index 1fd00bc..75d51fc 100644
--- a/debian/patches/0013-CVE-2006-3324-fix-arbitrary-file-overwrite-on-client.patch
+++ b/debian/patches/0013-CVE-2006-3324-fix-arbitrary-file-overwrite-on-client.patch
@@ -8,6 +8,7 @@ This commit also includes "a few sanity checks for checksum/pakname storage
 to fix a crash that can occur under certain circumstances", from r804
 and r805.
 
+Bug-Debian: http://bugs.debian.org/660832
 Bug-CVE: http://security-tracker.debian.org/tracker/CVE-2006-3324
 Origin: backport
 ---
diff --git a/debian/patches/0014-CVE-2006-3325-fix-arbitrary-cvar-overwriting.patch b/debian/patches/0014-CVE-2006-3325-fix-arbitrary-cvar-overwriting.patch
index 8a5f432..e560186 100644
--- a/debian/patches/0014-CVE-2006-3325-fix-arbitrary-cvar-overwriting.patch
+++ b/debian/patches/0014-CVE-2006-3325-fix-arbitrary-cvar-overwriting.patch
@@ -4,6 +4,7 @@ Subject: CVE-2006-3325: fix arbitrary cvar overwriting
 
 Original patch by Thilo Schulz, ioquake3 r811.
 
+Bug-Debian: http://bugs.debian.org/660834
 Bug-CVE: http://security-tracker.debian.org/tracker/CVE-2006-3325
 Origin: backport
 ---
diff --git a/debian/patches/0015-CVE-2011-3012-CVE-2011-2764-backport-from-ioquake3-t.patch b/debian/patches/0015-CVE-2011-3012-CVE-2011-2764-backport-from-ioquake3-t.patch
index 12adb99..fc64264 100644
--- a/debian/patches/0015-CVE-2011-3012-CVE-2011-2764-backport-from-ioquake3-t.patch
+++ b/debian/patches/0015-CVE-2011-3012-CVE-2011-2764-backport-from-ioquake3-t.patch
@@ -13,6 +13,7 @@ This is a backport of several patches:
   in previous commits, CVE-2011-2764)
 
 Origin: backport
+Bug-Debian: http://bugs.debian.org/660836
 Bug-CVE: http://security-tracker.debian.org/tracker/CVE-2011-3012
 Bug-CVE: http://security-tracker.debian.org/tracker/CVE-2011-2764
 ---

-- 
team based FPS game - packaging



More information about the Pkg-games-commits mailing list