Wesnoth security fixes
Bug #336396 reported by
Rhonda D'Vine
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
wesnoth (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Gutsy |
Fix Released
|
Undecided
|
Unassigned | ||
Hardy |
Fix Released
|
Undecided
|
Unassigned | ||
Intrepid |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Jaunty |
Invalid
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: wesnoth
Please find attached a proposed diff for fixing the CVE-2009-0367 problem in wesnoth for the hardy release. It also closes a memory exhaustion fix which might deeply influence the system of a user loading a special crafted map.
Related branches
Changed in wesnoth: | |
status: | New → In Progress |
Changed in wesnoth: | |
status: | New → Incomplete |
status: | New → Incomplete |
status: | New → Incomplete |
Changed in wesnoth (Ubuntu Intrepid): | |
status: | Incomplete → In Progress |
Changed in wesnoth: | |
assignee: | nobody → jdstrand |
status: | Confirmed → In Progress |
To post a comment you must log in.
Comparing the fixes that Debian performed[1], I think this patch may additionally require fixes for CVE-2009-0366. Also, please follow the changelog format in the Security Update Procedures[2], since that will make it easier for us to examine the patches.
I do have a worry that just ripping out Python is the wrong approach to take with this bug, as that drops features as well. However, in the light of upstream's response to the bug (they did the same), I think it makes sense. Will there be AIs that no longer work if this code is removed from wesnoth?
[1] http:// packages. debian. org/changelogs/ pool/main/ w/wesnoth/ current/ changelog /wiki.ubuntu. com/SecurityUpd ateProcedures
[2] https:/