Name | CVE-2018-1999023 |
Description | The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
wesnoth-1.10 (PTS) | jessie | 1:1.10.7-2+deb8u1 | vulnerable |
wesnoth-1.12 (PTS) | stretch | 1:1.12.6-1+deb9u1 | fixed |
wesnoth-1.14 (PTS) | buster | 1:1.14.5-1 | fixed |
bullseye | 1:1.14.15-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
wesnoth-1.10 | source | wheezy | (unfixed) | end-of-life | ||
wesnoth-1.10 | source | jessie | (unfixed) | end-of-life | ||
wesnoth-1.10 | source | (unstable) | (unfixed) | |||
wesnoth-1.12 | source | stretch | 1:1.12.6-1+deb9u1 | |||
wesnoth-1.12 | source | (unstable) | (unfixed) | |||
wesnoth-1.14 | source | (unstable) | 1:1.14.4-1 |
[jessie] - wesnoth-1.10 <end-of-life> (Games are not supported in Jessie)
https://www.openwall.com/lists/oss-security/2018/07/20/1
https://github.com/wesnoth/wesnoth/commit/d911268a783467842d38eae7ac1630f1fea41318 (1.14.x)