> Moin Moin,
>
> So it seems that the "buffer exploit" that's running around UrT
> servers is related to the QVM, at least from what I can tell that's
> where it segfaults for the x86 QVM (using the interpreted QVM I get
> "VM program counter out of range in OP_LEAVE" instead, still a crash).
> This brings up the following question: Is the QVM designed to be safe
> or not? It seems that a bug in the game code running on the VM will
> happily crash a server. If the QVM is "by design" unsafe then the only
> good fix for this will have to come from FrozenSand or whatever they
> are called these days. On the other hand, if the QVM is supposed to be
> safe, then I guess it's a VM bug. Advice?
>

Yes, this is absolutely a QVM bug.  You can patch this via ioq3 code,
which is what I have done.  It's a dirty little patch but it works.
The patch has been available for many months now:

http://forums.urbanterror.info/topic/18495-svn-repository-for-iourbanterror-exploit-fixes/
_______________________________________________
ioquake3 mailing list
[email protected]
http://lists.ioquake.org/listinfo.cgi/ioquake3-ioquake.org
By sending this message I agree to love ioquake3 and libsdl.

Reply via email to