An update that fixes four vulnerabilities is now available.
Description:
This update for teeworlds fixes the following issues:
CVE-2019-10879: An integer overflow in CDataFileReader::Open() could
have lead to a buffer overflow and possibly remote code execution,
because size-related multiplications were mishandled. (boo#1131729)
CVE-2019-10878: A failed bounds check in CDataFileReader::GetData() and
CDataFileReader::ReplaceData() and related functions could have lead to
an arbitrary free and out-of-bounds pointer write, possibly resulting in
remote code execution.
CVE-2019-10877: An integer overflow in CMap::Load() could have lead to a
buffer overflow, because multiplication of width and height were
mishandled.
CVE-2018-18541: Connection packets could have been forged. There was no
challenge-response involved in the connection build up. A remote
attacker could have sent connection packets from a spoofed IP address
and occupy all server slots, or even use them for a reflection attack
using map download packets. (boo#1112910)
Update to version 0.7.3.1
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:
openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2019-1999=1
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE Backports SLE | 15-SP1 | aarch64 | - opensuse backports sle | < 15-SP1 (aarch64 ppc64le x86_64): | - openSUSE Backports SLE-15-SP1 (aarch64 ppc64le x86_64):.aarch64.rpm |
openSUSE Backports SLE | 15-SP1 | ppc64le | - opensuse backports sle | < 15-SP1 (aarch64 ppc64le x86_64): | - openSUSE Backports SLE-15-SP1 (aarch64 ppc64le x86_64):.ppc64le.rpm |
openSUSE Backports SLE | 15-SP1 | x86_64 | - opensuse backports sle | < 15-SP1 (aarch64 ppc64le x86_64): | - openSUSE Backports SLE-15-SP1 (aarch64 ppc64le x86_64):.x86_64.rpm |