Debian Bug report logs -
#857714
iortcw: CVE-2017-6903: privilege escalation by auto-downloaded files
Reported by: Daniel Gibson <metalcaedes@gmail.com>
Date: Tue, 14 Mar 2017 04:03:01 UTC
Severity: grave
Tags: fixed-upstream, security, upstream
Found in version 1.42b+20150930+dfsg1-1
Fixed in version iortcw/1.50a+dfsg1-3
Done: Simon McVittie <smcv@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Debian Games Team <pkg-games-devel@lists.alioth.debian.org>:
Bug#857699; Package ioquake3.
(Tue, 14 Mar 2017 04:03:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Daniel Gibson <metalcaedes@gmail.com>:
New Bug report received and forwarded. Copy sent to Debian Games Team <pkg-games-devel@lists.alioth.debian.org>.
(Tue, 14 Mar 2017 04:03:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: ioquake3
Version: 1.36
Severity: grave
Hi,
earlier today ioquake3 fixed a vulnerability that, as far as I
understand, could let malicious multiplayer servers execute code on
connecting clients.
It affects all prior versions of ioquake3 (and I think also original
Quake 3).
Details:
https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/
So you should probably update to latest ioq3 git or backport the fix.
Cheers,
Daniel
No longer marked as found in versions 1.36.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org.
(Tue, 14 Mar 2017 07:15:04 GMT) (full text, mbox, link).
Marked as found in versions ioquake3/1.36+svn2287-1.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org.
(Tue, 14 Mar 2017 07:15:05 GMT) (full text, mbox, link).
Added tag(s) security and upstream.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org.
(Tue, 14 Mar 2017 07:15:06 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Games Team <pkg-games-devel@lists.alioth.debian.org>:
Bug#857699; Package ioquake3.
(Tue, 14 Mar 2017 08:33:09 GMT) (full text, mbox, link).
Acknowledgement sent
to Simon McVittie <smcv@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Games Team <pkg-games-devel@lists.alioth.debian.org>.
(Tue, 14 Mar 2017 08:33:10 GMT) (full text, mbox, link).
Message #16 received at 857699@bugs.debian.org (full text, mbox, reply):
Control: tags 857699 + security
Control: clone 857699 -2 -3
Control: reassign -2 iortcw 1.42b+20150930+dfsg1-1
Control: reassign -3 openjk 0~20150430+dfsg1-1
On Tue, 14 Mar 2017 at 04:59:15 +0100, Daniel Gibson wrote:
> earlier today ioquake3 fixed a vulnerability that, as far as I understand,
> could let malicious multiplayer servers execute code on connecting clients.
Thanks for reporting, I'll fix this ASAP.
Looks like I need to teach ioquake3 upstream about coordinated
disclosure, or remind them that their game is in distributions.
> It affects all prior versions of ioquake3 (and I think also original Quake
> 3).
> Details: https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/
cc'ing security team for information. No CVE ID yet, I assume ioquake3
upstream will be requesting one (or if not I will).
S
Bug 857699 cloned as bugs 857714, 857715
Request was from Simon McVittie <smcv@debian.org>
to 857699-submit@bugs.debian.org.
(Tue, 14 Mar 2017 08:33:10 GMT) (full text, mbox, link).
Bug reassigned from package 'ioquake3' to 'iortcw'.
Request was from Simon McVittie <smcv@debian.org>
to 857699-submit@bugs.debian.org.
(Tue, 14 Mar 2017 08:33:10 GMT) (full text, mbox, link).
No longer marked as found in versions ioquake3/1.36+svn2287-1.
Request was from Simon McVittie <smcv@debian.org>
to 857699-submit@bugs.debian.org.
(Tue, 14 Mar 2017 08:33:11 GMT) (full text, mbox, link).
Marked as found in versions 1.42b+20150930+dfsg1-1.
Request was from Simon McVittie <smcv@debian.org>
to 857699-submit@bugs.debian.org.
(Tue, 14 Mar 2017 08:33:12 GMT) (full text, mbox, link).
Added tag(s) pending and fixed-upstream.
Request was from Simon McVittie <smcv@debian.org>
to control@bugs.debian.org.
(Tue, 14 Mar 2017 10:45:06 GMT) (full text, mbox, link).
Reply sent
to Simon McVittie <smcv@debian.org>:
You have taken responsibility.
(Tue, 14 Mar 2017 10:51:10 GMT) (full text, mbox, link).
Notification sent
to Daniel Gibson <metalcaedes@gmail.com>:
Bug acknowledged by developer.
(Tue, 14 Mar 2017 10:51:10 GMT) (full text, mbox, link).
Message #31 received at 857714-close@bugs.debian.org (full text, mbox, reply):
Source: iortcw
Source-Version: 1.50a+dfsg1-3
We believe that the bug you reported is fixed in the latest version of
iortcw, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 857714@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Simon McVittie <smcv@debian.org> (supplier of updated iortcw package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 14 Mar 2017 09:37:19 +0000
Source: iortcw
Binary: rtcw rtcw-common rtcw-server
Architecture: source
Version: 1.50a+dfsg1-3
Distribution: unstable
Urgency: high
Maintainer: Debian Games Team <pkg-games-devel@lists.alioth.debian.org>
Changed-By: Simon McVittie <smcv@debian.org>
Closes: 857714
Description:
rtcw-common - common files for Return to Castle Wolfenstein
rtcw - game engine for Return to Castle Wolfenstein
rtcw-server - standalone server for Return to Castle Wolfenstein
Changes:
iortcw (1.50a+dfsg1-3) unstable; urgency=high
.
* d/gbp.conf: switch branch to debian/stretch for updates during freeze
* d/patches: Add patches from upstream fixing security vulnerabilities
- refuse to load potentially auto-downloadable .pk3 files as
iortcw renderers, iortcw game code, libcurl, or OpenAL drivers
(mitigation: auto-downloading is off by default, and in Debian
we do not dlopen libcurl anyway)
- refuse to load default configuration file names from a .pk3 file
- protect cl_renderer, cl_curllib, s_aldriver configuration variables so
game code cannot set them
- refuse to overwrite files other than *.txt with the dump console
command
- refuse to overwrite files other than *.cfg with the writeconfig
console command
(Closes: #857714)
Checksums-Sha1:
8ce0ab7e6cdb5faa8bc67dd9a386e85f4986c151 2247 iortcw_1.50a+dfsg1-3.dsc
e4edac62ee8b2fc81a3e399011b409d92cc7e194 31812 iortcw_1.50a+dfsg1-3.debian.tar.xz
Checksums-Sha256:
9e9fd42c9c7a48215950bc827f791d50c99d7b64cedcc36493e467f0b6f0d70b 2247 iortcw_1.50a+dfsg1-3.dsc
8ac7c810902acede665b1e1457c1dd12549a414e28d41123e6704baf2e19a470 31812 iortcw_1.50a+dfsg1-3.debian.tar.xz
Files:
42665eac07c13b16c0bfbc838b845ed5 2247 contrib/games optional iortcw_1.50a+dfsg1-3.dsc
b4a440635daa61d617cc2c9ea9d9208d 31812 contrib/games optional iortcw_1.50a+dfsg1-3.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=4Bhy
-----END PGP SIGNATURE-----
Changed Bug title to 'iortcw: CVE-2017-6903: privilege escalation by auto-downloaded files' from 'ioquake3 has a security vulnerability'.
Request was from Simon McVittie <smcv@debian.org>
to control@bugs.debian.org.
(Tue, 14 Mar 2017 22:33:04 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Mon, 17 Apr 2017 07:25:35 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Jul 2 14:40:36 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.