On May 20, 2010, at 11:21 AM, Nerius Landys wrote:

>> Moin Moin,
>> 
>> So it seems that the "buffer exploit" that's running around UrT
>> servers is related to the QVM, at least from what I can tell that's
>> where it segfaults for the x86 QVM (using the interpreted QVM I get
>> "VM program counter out of range in OP_LEAVE" instead, still a crash).
>> This brings up the following question: Is the QVM designed to be safe
>> or not? It seems that a bug in the game code running on the VM will
>> happily crash a server. If the QVM is "by design" unsafe then the only
>> good fix for this will have to come from FrozenSand or whatever they
>> are called these days. On the other hand, if the QVM is supposed to be
>> safe, then I guess it's a VM bug. Advice?
>> 
> 
> Yes, this is absolutely a QVM bug.  You can patch this via ioq3 code,
> which is what I have done.  It's a dirty little patch but it works.
> The patch has been available for many months now:
> 
> http://forums.urbanterror.info/topic/18495-svn-repository-for-iourbanterror-exploit-fixes/

Patches that aren't submitted to this list or bugzilla will (nearly) never be 
applied.

In this case, though, I'm inclined to blame urt for being closed-source toilet 
brushes about everything.


_______________________________________________
ioquake3 mailing list
[email protected]
http://lists.ioquake.org/listinfo.cgi/ioquake3-ioquake.org
By sending this message I agree to love ioquake3 and libsdl.

Reply via email to