Bug#911487: teeworlds: remote DOS by forging connection packets
Markus Koschany
apo at debian.org
Sat Oct 20 20:22:38 BST 2018
Hi,
Am 20.10.18 um 21:01 schrieb Salvatore Bonaccorso:
[...]
> For 0.6.5 the following two commits might be the relevant ones (not
> found any further possibly releated):
>
> https://github.com/teeworlds/teeworlds/commit/4c00063b2fd9c25998f3d308723e1ae65c20548d
> https://github.com/teeworlds/teeworlds/commit/439483cef207f3e09f453c3406343a21eff7ba68
>
> Is this correct?
Looks correct to me. I don't see any other commits between 0.6.4 and
0.6.5. that are related to this.
> Those two were reverted just after the 0.6.5 release apparently, to be
> substituted with an alternative approach.
>
> Was a CVE requested for this issue?
I don't know. I have opened a new ticket here:
https://github.com/teeworlds/teeworlds/issues/1536
Regards,
Markus
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 963 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/pkg-games-devel/attachments/20181020/3dc95c58/attachment.sig>
More information about the Pkg-games-devel
mailing list