Updated wesnoth packages fix security vulnerability
Publication date: 27 Jul 2015Modification date: 27 Jul 2015
Type: security
Affected Mageia releases : 4
CVE: CVE-2015-5069 , CVE-2015-5070
Description
Toom Lõhmus discovered that the Lua API and preprocessor in the Battle for Wesnoth game up to version 1.12.2 included could lead to client-side authentication information disclosure using maliciously crafted files with the .pdb extension (CVE-2015-5069, CVE-2015-5070). This issue has been fixed using patches from upstream's 1.10.x branch.
References
- https://bugs.mageia.org/show_bug.cgi?id=16208
- http://openwall.com/lists/oss-security/2015/06/25/12
- http://forums.wesnoth.org/viewtopic.php?t=42776
- https://github.com/wesnoth/wesnoth/commit/055fea16479a755d6744a52f78f63548b692c440
- https://github.com/wesnoth/wesnoth/commit/d20f8015bc3653a10d6d4dfd751e62651d1180b7
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5069
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5070
SRPMS
4/core
- wesnoth-1.10.7-2.2.mga4