The 0.6.3 release of Teeworlds, an online multi-player platform 2D shooter, fixes an invalid read issue. This could be used to leak memory to a remote attacker, or possibly cause a crash: https://www.teeworlds.com/?page=news&id=11200 Upstream fix: https://github.com/teeworlds/teeworlds/commit/a766cb44bcffcdb0b88e776d01c5ee1323d44f85 References: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770514
Created teeworlds tracking bugs for this issue: Affects: fedora-all [bug 1167168]
teeworlds-0.6.3-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
teeworlds-0.6.3-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
teeworlds-0.6.3-1.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
Common Vulnerabilities and Exposures assigned an identifier CVE-2014-9351 to the following vulnerability: Name: CVE-2014-9351 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9351 Assigned: 20141209 Reference: http://www.securityfocus.com/bid/71301 engine/server/server.cpp in Teeworlds 0.6.x before 0.6.3 allows remote attackers to read memory and cause a denial of service (crash) via unspecified vectors.