Date: Sun, 22 Jul 2018 08:20:13 -0400 From: Iris Morelle <shadowm2006@...il.com> To: oss-security@...ts.openwall.com Subject: Re: CVE request: Wesnoth arbitrary code execution/sandbox escape On Thursday, July 19, 2018 9:13:42 PM -04 you wrote: > Hello, > > We've found an issue in our software, "The Battle for Wesnoth", which allows > arbitrary code execution by exploiting a vulnerability within the Lua > scripting language engine which allows escaping existing sandbox measures > in place and executing untrusted bytecode. This has been assigned CVE-2018-1999023. The fix is shipped in the newly- released version 1.14.4. -- Regards Iris Morelle
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.