An important note to Mumble Users of TWiTCraft
2 posts
• Page 1 of 1
- spinnibbler
-
- Posts: 46
- Joined: 13 Jan 2014, 16:49
- Minecraft username: spinnibbler
An important note to Mumble Users of TWiTCraft
PSA
PLEASE! Update to 1.2.5
It addresses 2 client side security threats.
Mumble-SA-2014-001 [sig] (CVE-2014-0044)
– A malformed Opus voice packet sent to a Mumble client could trigger a NULL pointer dereference or an out-of-bounds array access.
Mumble-SA-2014-002 [sig] (CVE-2014-0045)
– A malformed Opus voice packet sent to a Mumble client could trigger a heap-based buffer overflow.
Sited from here:
http://blog.mumble.info/mumble-1-2-5/#more-517
So please update!
Thanks.
PLEASE! Update to 1.2.5
It addresses 2 client side security threats.
Mumble-SA-2014-001 [sig] (CVE-2014-0044)
– A malformed Opus voice packet sent to a Mumble client could trigger a NULL pointer dereference or an out-of-bounds array access.
Mumble-SA-2014-002 [sig] (CVE-2014-0045)
– A malformed Opus voice packet sent to a Mumble client could trigger a heap-based buffer overflow.
Sited from here:
http://blog.mumble.info/mumble-1-2-5/#more-517
So please update!
Thanks.
- VanDerProtofsky
-
- Posts: 116
- Joined: 09 Aug 2013, 20:38
- Minecraft username: VanDerProtofsky
Re: An important note to Mumble Users of TWiTCraft
thank you for this!
in addition, i do recall other players previously had issues getting Mumble to load, perhaps due to a "certificate" issue. updating 1.2.5 is most likely to also fix this issue.
in addition, i do recall other players previously had issues getting Mumble to load, perhaps due to a "certificate" issue. updating 1.2.5 is most likely to also fix this issue.
2 posts
• Page 1 of 1
Who is online
Users browsing this forum: No registered users and 1 guest
