Server security vulnerability
Bug #1486946 reported by
pcworld
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
teeworlds (Debian) |
Fix Released
|
Unknown
|
|||
teeworlds (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Teeworlds 0.6.3 released a security fix for an exploitable server bug ("Memory reads, Segmentation Fault"): https:/
Debian has already backported the fix to 0.6.2: https:/
This fix (affecting teeworlds-server) is already included in vivid and wily, but should be backported to older but still supported Ubuntu releases.
Teeworlds 0.6.3 also fixed a bug in the client, which seems not to have been included in the current Debian release: "Fix client crash when opening a map with an invalid version"
Related branches
CVE References
information type: | Private Security → Public Security |
Changed in teeworlds (Debian): | |
status: | Unknown → Fix Released |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res