Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=d74c4d3e8d1eb6199c4ed85966d7d47b892b523b
commit d74c4d3e8d1eb6199c4ed85966d7d47b892b523b Author: voroskoi <[EMAIL PROTECTED]> Date: Tue Jan 15 19:53:25 2008 +0100 FSA343-wesnoth diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index 80617d6..ab3aeea 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -27,6 +27,20 @@ <fsas> <fsa> + <id>343</id> + <date>2008-01-15</date> + <author>voroskoi</author> + <package>wesnoth</package> + <vulnerable>1.2.6-2terminus1</vulnerable> + <unaffected>1.2.8-1terminus1</unaffected> + <bts>http://bugs.frugalware.org/task/2648</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5742 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6201</cve> + <desc>Some vulnerabilities have been reported in Wesnoth, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise a vulnerable system. + 1) An error within the WML preprocessor can be exploited via a malicious add-on to disclose the content of arbitrary files on an affected system when processing pathnames that contain directory traversal sequences. + 2) An error within the handling of the "turn_cmd" option can be exploited to cause a DoS or potentially execute arbitrary commands via a malicious add-on.</desc> + </fsa> + <fsa> <id>342</id> <date>2008-01-15</date> <author>voroskoi</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
