Date: Tue, 11 Oct 2011 11:29:14 GMT From: "Ilya A. Arkhipov" <micro@heavennet.ru> To: freebsd-gnats-submit@FreeBSD.org Subject: ports/161488: Upgrade OpenTTD to 1.1.3 Message-ID: <201110111129.p9BBTEUc002572@red.freebsd.org> Resent-Message-ID: <201110111130.p9BBU8Nx020889@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 161488 >Category: ports >Synopsis: Upgrade OpenTTD to 1.1.3 >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Tue Oct 11 11:30:08 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Ilya A. Arkhipov >Release: FreeBSD 10.0-CURRENT >Organization: Luxoft >Environment: FreeBSD micro 10.0-CURRENT FreeBSD 10.0-CURRENT #3 r226184: Mon Oct 10 12:44:23 MSK 2011 root@micro:/usr/obj/usr/src/sys/MICROKERNEL amd64 >Description: Update OpenTTD to 1.1.3. And add vuxml entry for: CVE-2011-3343 -- http://security.openttd.org/en/CVE-2011-3343 CVE-2011-3342 -- http://security.openttd.org/en/CVE-2011-3342 CVE-2011-3341 -- http://security.openttd.org/en/CVE-2011-3341 >How-To-Repeat: >Fix: Patch attached with submission follows: diff -Nru openttd_1.1.2/Makefile openttd/Makefile --- openttd_1.1.2/Makefile 2011-10-11 14:37:42.758214257 +0400 +++ openttd/Makefile 2011-10-11 14:37:53.752211050 +0400 @@ -6,7 +6,7 @@ # PORTNAME= openttd -PORTVERSION= 1.1.2 +PORTVERSION= 1.1.3 CATEGORIES= games MASTER_SITES= http://gb.binaries.openttd.org/binaries/releases/${PORTVERSION}/ \ http://ftp.snt.utwente.nl/pub/games/openttd/binaries/releases/${PORTVERSION}/ \ diff -Nru openttd_1.1.2/distinfo openttd/distinfo --- openttd_1.1.2/distinfo 2011-10-11 14:37:42.771221915 +0400 +++ openttd/distinfo 2011-10-11 14:37:57.862207711 +0400 @@ -1,2 +1,2 @@ -SHA256 (openttd-1.1.2-source.tar.xz) = 372073bd2b87c078c714176d1b75e16768a85122993ebd7a36e60aa071903b3d -SIZE (openttd-1.1.2-source.tar.xz) = 5040364 +SHA256 (openttd-1.1.3-source.tar.xz) = 3adb21211fe02411110beaf1f447e03e8a2e9e07b5d9f92247a5b063881c8ed6 +SIZE (openttd-1.1.3-source.tar.xz) = 5165696 diff -Nru vuxml_old/vuln.xml vuxml/vuln.xml --- vuxml_old/vuln.xml 2011-10-11 15:21:55.428208767 +0400 +++ vuxml/vuln.xml 2011-10-11 15:17:53.608208879 +0400 @@ -34,6 +34,89 @@ --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="9bad5ab1-f3f6-11e0-8b5c-b482fe3f522d"> + <topic>OpenTTD -- Multiple buffer overflows in validation of external data</topic> + <affects> + <package> + <name>openttd</name> + <range><ge>0.1.0</ge><lt>1.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenTTD Team reports:</p> + <blockquote cite="http://security.openttd.org/en/CVE-2011-3343"> + <p>Multiple buffer overflows in OpenTTD before 1.1.3 allow + local users to cause a denial of service (daemon crash) or + possibly gain privileges via (1) a crafted BMP file with RLE + compression or (2) crafted dimensions in a BMP file.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-3343</cvename> + <url>http://security.openttd.org/en/CVE-2011-3343</url> + </references> + <dates> + <discovery>2011-08-25</discovery> + <entry>2011-09-02</entry> + </dates> + </vuln> + <vuln vid="78c25ed7-f3f9-11e0-8b5c-b482fe3f522d"> + <topic>OpenTTD -- Buffer overflows in savegame loading</topic> + <affects> + <package> + <name>openttd</name> + <range><ge>0.1.0</ge><lt>1.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenTTD Team reports:</p> + <blockquote cite="http://security.openttd.org/en/CVE-2011-3342"> + <p>Multiple buffer overflows in OpenTTD before 1.1.3 allow remote + attackers to cause a denial of service (daemon crash) or possibly + execute arbitrary code via vectors related to (1) NAME, (2) PLYR, + (3) CHTS, or (4) AIPL (aka AI config) chunk loading from a savegame.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-3342</cvename> + <url>http://security.openttd.org/en/CVE-2011-3342</url> + </references> + <dates> + <discovery>2011-08-08</discovery> + <entry>2011-08-25</entry> + </dates> + </vuln> + <vuln vid="e77befb5-f3f9-11e0-8b5c-b482fe3f522d"> + <topic>OpenTTD -- Denial of service via improperly validated commands</topic> + <affects> + <package> + <name>openttd</name> + <range><ge>0.3.5</ge><lt>1.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenTTD Team reports:</p> + <blockquote cite="http://security.openttd.org/en/CVE-2011-3341"> + <p>Multiple off-by-one errors in order_cmd.cpp in OpenTTD before + 1.1.3 allow remote attackers to cause a denial of service (daemon crash) + or possibly execute arbitrary code via a crafted CMD_INSERT_ORDER command.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2011-3341</cvename> + <url>http://security.openttd.org/en/CVE-2011-3341</url> + </references> + <dates> + <discovery>2011-08-25</discovery> + <entry>2011-08-26</entry> + </dates> + </vuln> <vuln vid="ab9be2c8-ef91-11e0-ad5a-00215c6a37bb"> <topic>quagga -- multiple vulnerabilities</topic> <affects> >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201110111129.p9BBTEUc002572>