[Pkg-games-ubuntu] [Bug 970819] Re: multiple security vulnerabilities
Simon McVittie
970819 at bugs.launchpad.net
Fri May 18 12:41:28 UTC 2012
> Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
posting a debdiff for this issue.
I am not an Ubuntu user (I reported this bug after fixing these
vulnerabilities in Debian, to be helpful to our downstream
distribution), so I'm afraid I'm not going to take on Ubuntu package
maintenance.
I asked for a new maintainer for Tremulous in Debian, and nobody
volunteered, so I have now arranged for Tremulous to be removed from
Debian testing/unstable. As a result, it will not be in Debian 7.0,
unless someone re-uploads it within the next 2-4 weeks and takes
responsibility for it.
If nobody from the Ubuntu community intends to take responsibility for
securing the Tremulous packages, I would recommend removing these
packages from Ubuntu as well.
--
You received this bug notification because you are a member of
Debian/Ubuntu Games Team, which is subscribed to tremulous in Ubuntu.
https://bugs.launchpad.net/bugs/970819
Title:
multiple security vulnerabilities
Status in “tremulous” package in Ubuntu:
Confirmed
Bug description:
Please consider syncing tremulous/1.1.0-8 from Debian unstable into
all supported Ubuntu versions. It fixes:
- CVE-2006-2082: arbitrary file download from server by a malicious client
(Closes: #660831)
- CVE-2006-2236 ("the remapShader exploit"): missing bounds-checking on
COM_StripExtension, exploitable in clients of a malicious server
(Closes: #660827)
- CVE-2006-2875 ("q3cbof"): buffer overflow in CL_ParseDownload by a
malicious server (Closes: #660830)
- CVE-2006-3324: arbitrary file overwriting in clients of a malicious
server (Closes: #660832)
- CVE-2006-3325: arbitrary cvar overwriting (could lead to arbitrary
code execution) in clients of a malicious server (Closes: #660834)
- CVE-2011-3012, CVE-2011-2764: DLL overwriting (leading to arbitrary
code execution) in clients of a malicious server if auto-downloading
is enabled (Closes: #660836)
- a potential buffer overflow in error
handling (not known to be exploitable, but it can't hurt)
- non-literal format strings (again, none are known to be
exploitable)
- CVE-2010-5077, use of Tremulous servers by third parties to perform
reflected DoS attacks
It also disables auto-downloading to mitigate any future security
vulnerabilities.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tremulous/+bug/970819/+subscriptions
More information about the Pkg-games-ubuntu
mailing list