ALT-BU-2015-2600-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-0844
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
- http://forums.wesnoth.org/viewtopic.php?t=41870
- http://forums.wesnoth.org/viewtopic.php?t=41870
- http://forums.wesnoth.org/viewtopic.php?t=41872
- http://forums.wesnoth.org/viewtopic.php?t=41872
- FEDORA-2015-6108
- FEDORA-2015-6108
- FEDORA-2015-6280
- FEDORA-2015-6280
- FEDORA-2015-6295
- FEDORA-2015-6295
- DSA-3218
- DSA-3218
Modified: 2024-11-21
CVE-2015-5069
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML.
- FEDORA-2015-10973
- FEDORA-2015-10973
- FEDORA-2015-10964
- FEDORA-2015-10964
- [oss-security] 20150625 Re: CVE request: Wesnoth authentication information disclosure
- [oss-security] 20150625 Re: CVE request: Wesnoth authentication information disclosure
- 75424
- 75424
- https://bugzilla.redhat.com/show_bug.cgi?id=1236010
- https://bugzilla.redhat.com/show_bug.cgi?id=1236010
- https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d
- https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d
- https://github.com/wesnoth/wesnoth/releases/tag/1.12.3
- https://github.com/wesnoth/wesnoth/releases/tag/1.12.3
- https://github.com/wesnoth/wesnoth/releases/tag/1.13.1
- https://github.com/wesnoth/wesnoth/releases/tag/1.13.1
- https://gna.org/bugs/?23504
- https://gna.org/bugs/?23504
Modified: 2024-11-21
CVE-2015-5070
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069.
- FEDORA-2015-10973
- FEDORA-2015-10973
- FEDORA-2015-10964
- FEDORA-2015-10964
- [oss-security] 20150625 Re: CVE request: Wesnoth authentication information disclosure
- [oss-security] 20150625 Re: CVE request: Wesnoth authentication information disclosure
- 75425
- 75425
- https://bugzilla.redhat.com/show_bug.cgi?id=1236010
- https://bugzilla.redhat.com/show_bug.cgi?id=1236010
- https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59
- https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59
- https://github.com/wesnoth/wesnoth/releases/tag/1.12.4
- https://github.com/wesnoth/wesnoth/releases/tag/1.12.4
- https://github.com/wesnoth/wesnoth/releases/tag/1.13.1
- https://github.com/wesnoth/wesnoth/releases/tag/1.13.1
- https://gna.org/bugs/?23504
- https://gna.org/bugs/?23504
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-5607
Cross-site request forgery in the REST API in IPython 2 and 3.
- FEDORA-2015-11677
- FEDORA-2015-11677
- FEDORA-2015-11767
- FEDORA-2015-11767
- [oss-security] 20150721 Re: CVE request: IPython CSRF validation
- [oss-security] 20150721 Re: CVE request: IPython CSRF validation
- https://bugzilla.redhat.com/show_bug.cgi?id=1243842
- https://bugzilla.redhat.com/show_bug.cgi?id=1243842
- https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816
- https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816
- https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0
- https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0