tremulous_1.1.0-7~squeeze1_i386.changes ACCEPTED into proposed-updates

Debian FTP Masters ftpmaster at ftp-master.debian.org
Mon Mar 26 18:33:04 UTC 2012



Notes:
Mapping stable to proposed-updates.


Accepted:
tremulous-doc_1.1.0-7~squeeze1_all.deb
  to contrib/t/tremulous/tremulous-doc_1.1.0-7~squeeze1_all.deb
tremulous-server_1.1.0-7~squeeze1_i386.deb
  to contrib/t/tremulous/tremulous-server_1.1.0-7~squeeze1_i386.deb
tremulous_1.1.0-7~squeeze1.debian.tar.gz
  to contrib/t/tremulous/tremulous_1.1.0-7~squeeze1.debian.tar.gz
tremulous_1.1.0-7~squeeze1.dsc
  to contrib/t/tremulous/tremulous_1.1.0-7~squeeze1.dsc
tremulous_1.1.0-7~squeeze1_i386.deb
  to contrib/t/tremulous/tremulous_1.1.0-7~squeeze1_i386.deb


Changes:
tremulous (1.1.0-7~squeeze1) stable; urgency=low
 .
  * Stable update (#663104), incorporating security fixes from unstable
  * Fix an incorrect bug number in revision -6
 .
tremulous (1.1.0-7) unstable; urgency=medium
 .
  * Add a lintian override for embedded-library libjpeg (#589407) to avoid
    auto-rejection. It is a valid bug, but is not a regression, and fixing
    several long-standing security vulnerabilities seems more important
    than getting rid of an embedded library that is not known to be
    exploitable.
 .
tremulous (1.1.0-6) unstable; urgency=medium
 .
  * Backport patches from ioquake3 to fix long-standing security bugs:
    - CVE-2006-2082: arbitrary file download from server by a malicious client
      (Closes: #660831)
    - CVE-2006-2236 ("the remapShader exploit"): missing bounds-checking on
      COM_StripExtension, exploitable in clients of a malicious server
      (Closes: #660827)
    - CVE-2006-2875 ("q3cbof"): buffer overflow in CL_ParseDownload by a
      malicious server (Closes: #660830)
    - CVE-2006-3324: arbitrary file overwriting in clients of a malicious
      server (Closes: #660832)
    - CVE-2006-3325: arbitrary cvar overwriting (could lead to arbitrary
      code execution) in clients of a malicious server (Closes: #660834)
    - CVE-2011-3012, CVE-2011-2764: DLL overwriting (leading to arbitrary
      code execution) in clients of a malicious server if auto-downloading
      is enabled (Closes: #660836)
  * As a precaution, disable auto-downloading
  * Backport ioquake3 r1141 to fix a potential buffer overflow in error
    handling (not known to be exploitable, but it can't hurt)
  * Add gcc attributes to all printf- and scanf-like functions, and
    fix non-literal format strings (again, none are known to be exploitable)


Override entries for your package:
tremulous-doc_1.1.0-7~squeeze1_all.deb - optional contrib/doc
tremulous-server_1.1.0-7~squeeze1_i386.deb - optional contrib/games
tremulous_1.1.0-7~squeeze1.dsc - source contrib/games
tremulous_1.1.0-7~squeeze1_i386.deb - optional contrib/games

Announcing to debian-changes at lists.debian.org
Closing bugs: 660827 660830 660831 660832 660834 660836 


Thank you for your contribution to Debian.



More information about the Pkg-games-devel mailing list