Bug#355211: freeciv-server: security hole

2006-03-04 Thread Martin Schulze
Jason Dorje Short wrote:
 Package: freeciv-server
 Version: 2.0.7-2
 Severity: important
 
 
 Jordi -
 
 There is a security hole in Freeciv 2.0 allowing a remote user to trigger a
 server crash (it is unlikely anything more than a crashed civserver would
 result from the hole).  This patch (which will be included in the upcoming
 2.0.8 release) will fix it; I recommend you upload it and/or get ready for
 2.0.8 in a couple of days.

Jason,

please mention CVE-2006-0047 in the changelog when you release the new
version.

CVE-2006- a unique identifier for a vulnerability in a software
package.  The database behind this is maintained at MITRE's Common
Vulnerabilities and Exposures project http://cve.mitre.org/cve/.
Details for such an id are available after a few days of quarantaine
at http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-.

Many vendors (both propriatery and Free Software) participate in this
database and assign the id to vulnerability reports or updates they
produce.  These IDs help us security people generally for identifying
if a given package is fixed or if a given update fixes which problem.
Please mention this ID in the changelog and/or project announcements.

Regards,

Joey

-- 
The MS-DOS filesystem is nice for removable media.  -- H. Peter Anvin

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#355211: freeciv-server: security hole

2006-03-03 Thread Jason Dorje Short
Package: freeciv-server
Version: 2.0.7-2
Severity: important


Jordi -

There is a security hole in Freeciv 2.0 allowing a remote user to trigger a
server crash (it is unlikely anything more than a crashed civserver would
result from the hole).  This patch (which will be included in the upcoming
2.0.8 release) will fix it; I recommend you upload it and/or get ready for
2.0.8 in a couple of days.

Index: common/packets.c
===
--- common/packets.c(revision 11709)
+++ common/packets.c(working copy)
@@ -362,13 +362,13 @@
   }
 #endif

-  if (whole_packet_len  pc-buffer-ndata) {
+  if ((unsigned)whole_packet_len  pc-buffer-ndata) {
 return NULL;   /* not all data has been read */
   }

 #ifdef USE_COMPRESSION
   if (compressed_packet) {
-int compressed_size = whole_packet_len - header_size;
+uLong compressed_size = whole_packet_len - header_size;
 /*
  * We don't know the decompressed size. We assume a bad case
  * here: an expansion by an factor of 100.


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages freeciv-server depends on:
ii  freeciv-data  2.0.7-2Civilization turn based strategy g
ii  libc6 2.3.6-2GNU C Library: Shared libraries an
ii  libreadline5  5.1-6  GNU readline and history libraries
ii  zlib1g1:1.2.3-9  compression library - runtime

freeciv-server recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#355211: [Pkg-freeciv-devel] Bug#355211: freeciv-server: security hole

2006-03-03 Thread Jason Dorje Short

See PR#15762.


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]