*** This bug is a security vulnerability *** Public security bug reported:
Teeworlds 0.6.3 released a security fix for an exploitable server bug ("Memory reads, Segmentation Fault"): https://www.teeworlds.com/?page=news&id=11200 Debian has already backported the fix to 0.6.2: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514 This fix (affecting teeworlds-server) is already included in vivid and wily, but should be backported to older but still supported Ubuntu releases. Teeworlds 0.6.3 also fixed a bug in the client, which seems not to have been included in the current Debian release: "Fix client crash when opening a map with an invalid version" ** Affects: teeworlds (Ubuntu) Importance: Undecided Status: New ** Affects: teeworlds (Debian) Importance: Unknown Status: Unknown ** Tags: precise trusty utopic ** Information type changed from Private Security to Public Security ** Bug watch added: Debian Bug tracker #770514 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514 ** Also affects: teeworlds (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1486946 Title: Server security vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/teeworlds/+bug/1486946/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs