Bug#493714: openttd: Network exploitable buffer overrun

2008-08-13 Thread Thijs Kinkhorst
> > I got a private mail by the maintainer stating: > > "New version should be uploaded this weekend, I'll mail the > > release team with details when that happens." > > I'm having a bit of a problem with this upload, since my regular sponsor > seems to be away. I had asked a DD to upload it last w

Bug#493714: openttd: Network exploitable buffer overrun

2008-08-12 Thread Matthijs Kooijman
Hi, > I got a private mail by the maintainer stating: > "New version should be uploaded this weekend, I'll mail the > release team with details when that happens." I'm having a bit of a problem with this upload, since my regular sponsor seems to be away. I had asked a DD to upload it last weekend

Bug#493714: openttd: Network exploitable buffer overrun

2008-08-10 Thread Nico Golde
Hi Moritz, * Moritz Muehlenhoff <[EMAIL PROTECTED]> [2008-08-10 20:42]: > R. Bijker wrote: > > Therefore the best way to fix this is by upgrading to 0.6.2, also in lenny. > > I agree, can you upload 0.6.2 to unstable? I got a private mail by the maintainer stating: "New version should be uploaded

Bug#493714: openttd: Network exploitable buffer overrun

2008-08-10 Thread R. Bijker
Moritz Muehlenhoff wrote: I agree, can you upload 0.6.2 to unstable? Cheers, Moritz I have absolutely no influence over getting OpenTTD 0.6.2 physically uploaded to Debian-unstable. Regards, Remko Bijker -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscri

Bug#493714: openttd: Network exploitable buffer overrun

2008-08-10 Thread Moritz Muehlenhoff
R. Bijker wrote: > Therefore the best way to fix this is by upgrading to 0.6.2, also in lenny. I agree, can you upload 0.6.2 to unstable? Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#493714: openttd: Network exploitable buffer overrun

2008-08-04 Thread R. Bijker
Package: openttd Version: 0.6.1-1 Severity: grave Tags: security Justification: user security hole OpenTTD servers of version 0.6.1 and below are susceptible to a remotely exploitable buffer overflow when the server is filled with companies and clients with names that are (near) the maximum allow