Source: freeciv
Version: 3.0.6-1
Severity: grave
Tags: security upstream fixed-upstream
Justification: user security hole
Forwarded: https://redmine.freeciv.org/issues/1955
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: fixed -1 3.0.6-1+deb12u1
Control: fixed -1 3.1.4+ds-2+deb13u1

Hi,

The following vulnerability was published for freeciv.

CVE-2026-33250[0]:
| Network code (recursive jumbo packets) DOS attack

It was fixed in a DSA already released by Moritz, so adjusting the
metadata.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-33250
    https://www.cve.org/CVERecord?id=CVE-2026-33250
[1] https://redmine.freeciv.org/issues/1955

Regards,
Salvatore

Reply via email to