As you can read in his advisory any application using the engine may be vulnerable and it may be possible to find other ways to exploit the buffer overflow than just a DoS. http://aluigi.altervista.org/adv/unrwebdos-adv.txt
games please advise.
I'll be checking for patches from upstream, but will likely be masking the affected packages.
Can someone from games comment on this?
All of the packages appear to be masked and no GLSA will be issued.