http://secunia.com/advisories/19984/ Description: landser has reported a vulnerability in Quake 3 Engine, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of the "remapShader" command. This can be exploited to cause a buffer overflow via specially crafted "remapShader" commands sent to a client. Successful exploitation may allow arbitrary code execution, but requires that the user is e.g. tricked into connecting to a malicious game server. The vulnerability has been reported in the following software: * ET 2.60. * Return to Castle Wolfenstein 1.41. * Quake III Arena 1.32b. Other versions may also be affected. Solution: Do not connect to non-trusted game servers. Provided and/or discovered by: landser Original Advisory: http://www.milw0rm.com/exploits/1750
Affects also Enemy Territory according to heise.de.
right can we group games-fps/enemy-territory* and games-fps/quake3* into this unique bug ?
Well, since it looks like we won't be getting updated versions of these, I'm going to try to see if there's any unofficial patches which resovle this bug, then mask, if not.
http://thilo.kickchat.com/patches/quake3-1.32b-remapshader-fix.diff
http://www.bluesnews.com/plans/476/ Even better... id Software has released new versions of all of these binaries. I'll be creating some new ebuilds this evening for them all.
Thanks Chris
*** Bug 132781 has been marked as a duplicate of this bug. ***
These are all in the tree now: enemy-territory 2.60b quake3-bin 1.32c rtcw 1.41b They are already tested and marked stable on x86 and amd64. The older versions have been masked, and will probably stay that way for a few days. Everything should be ready for a GLSA now. =]
Yep, thx
GLSA-200605-12 , thanks jaervosz