*** This bug is a security vulnerability ***
Public security bug reported:
Teeworlds 0.6.3 released a security fix for an exploitable server bug ("Memory
reads, Segmentation Fault"): https://www.teeworlds.com/?page=news&id=11200
Debian has already backported the fix to 0.6.2:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514
This fix (affecting teeworlds-server) is already included in vivid and wily,
but should be backported to older but still supported Ubuntu releases.
Teeworlds 0.6.3 also fixed a bug in the client, which seems not to have
been included in the current Debian release: "Fix client crash when
opening a map with an invalid version"
** Affects: teeworlds (Ubuntu)
Importance: Undecided
Status: New
** Affects: teeworlds (Debian)
Importance: Unknown
Status: Unknown
** Tags: precise trusty utopic
** Information type changed from Private Security to Public Security
** Bug watch added: Debian Bug tracker #770514
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514
** Also affects: teeworlds (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1486946
Title:
Server security vulnerability
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/teeworlds/+bug/1486946/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs