Bug#911487: teeworlds: remote DOS by forging connection packets

Markus Koschany apo at debian.org
Sat Oct 20 20:22:38 BST 2018


Hi,

Am 20.10.18 um 21:01 schrieb Salvatore Bonaccorso:
[...]
> For 0.6.5 the following two commits might be the relevant ones (not
> found any further possibly releated):
> 
> https://github.com/teeworlds/teeworlds/commit/4c00063b2fd9c25998f3d308723e1ae65c20548d
> https://github.com/teeworlds/teeworlds/commit/439483cef207f3e09f453c3406343a21eff7ba68
> 
> Is this correct?

Looks correct to me. I don't see any other commits between 0.6.4 and
0.6.5. that are related to this.

> Those two were reverted just after the 0.6.5 release apparently, to be
> substituted with an alternative approach.
> 
> Was a CVE requested for this issue?

I don't know. I have opened a new ticket here:

https://github.com/teeworlds/teeworlds/issues/1536

Regards,

Markus

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 963 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/pkg-games-devel/attachments/20181020/3dc95c58/attachment.sig>


More information about the Pkg-games-devel mailing list