Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 345691 (CVE-2010-4168) - <games-simulation/openttd-1.0.5: Denial of Service Vulnerability (CVE-2010-4168)
Summary: <games-simulation/openttd-1.0.5: Denial of Service Vulnerability (CVE-2010-4168)
Status: RESOLVED FIXED
Alias: CVE-2010-4168
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://security.openttd.org/en/CVE-20...
Whiteboard: B3 [noglsa]
Keywords:
Depends on: 346229
Blocks:
  Show dependency tree
 
Reported: 2010-11-15 23:55 UTC by Tim Sammut (RETIRED)
Modified: 2011-01-03 20:57 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
patch from http://security.openttd.org/en/patch/28.patch (28.patch,1.25 KB, patch)
2010-11-18 11:36 UTC, Thomas
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Tim Sammut (RETIRED) gentoo-dev 2010-11-15 23:55:45 UTC
From $URL: 

<--

When a client disconnects, without sending the "quit" or "client error" message, the server has a chance of reading and writing a just freed piece of memory. The chance depends on when the disconnect is noticed, whether OpenTTD can write to the socket, and whether there are packets from the client waiting to be processed. The writing can only happen while the server is sending the map.

For clients there is a chance that, upon reconnect after being disconnected during the join process, a just freed piece of memory is read.

Depending on what happens directly after freeing the memory there is a chance that a segmentation fault, and thus a denial of service will occur.

The attached patch does not change network compatability at all. 

<--

Upstream indicates this is fixed in 1.0.5.
Comment 1 Thomas 2010-11-18 11:36:37 UTC
Created attachment 254707 [details, diff]
patch from http://security.openttd.org/en/patch/28.patch

(In reply to comment #0)
> The attached patch does not change network compatability at all.
Comment 2 Tim Sammut (RETIRED) gentoo-dev 2010-11-22 14:37:22 UTC
=games-simulation/openttd-1.0.5 was added to the tree thanks to bug 346229.

Mr_bones_, or the games herd, if you don't mind removing this from package.mask, we will call for stabilization.

# Michael Sterrett <mr_bones_@gentoo.org> (17 Nov 2010)
# Security mask for bug #345691
games-simulation/openttd

Thank you.
Comment 3 Tomáš Chvátal (RETIRED) gentoo-dev 2010-11-23 09:19:03 UTC
The version is now unmasked.
CC arches as see fit.
Comment 4 Tupone Alfredo gentoo-dev 2010-11-23 11:34:08 UTC
Maybe stabilize 1.0.5?
Comment 5 Tim Sammut (RETIRED) gentoo-dev 2010-11-23 14:37:55 UTC
Thanks, folks.

Arches, please test and mark stable:
=games-simulation/openttd-1.0.5
Target keywords : "amd64 ppc ppc64 x86"
Comment 6 Christian Faulhammer (RETIRED) gentoo-dev 2010-11-24 00:01:44 UTC
x86 stable
Comment 7 Brent Baude (RETIRED) gentoo-dev 2010-11-25 00:59:01 UTC
ppc done
Comment 8 Brent Baude (RETIRED) gentoo-dev 2010-11-25 01:24:40 UTC
ppc64 done
Comment 9 blain 'Doc' Anderson 2010-11-27 17:39:40 UTC
AMD64 done
Comment 10 Markos Chandras (RETIRED) gentoo-dev 2010-11-28 12:07:55 UTC
amd64 done. Thanks Blain
Comment 11 Tim Sammut (RETIRED) gentoo-dev 2010-11-28 15:18:00 UTC
GLSA Vote: yes.
Comment 12 Stefan Behte (RETIRED) gentoo-dev Security 2010-11-29 20:27:11 UTC
Vote: NO (it's just a game, and only DOS).
Comment 13 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2011-01-03 20:57:46 UTC
DoS in a game is hardly a security issue so GLSA Vote: no -> Closing. Feel free to reopen if you disagree.