Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 22 Jul 2018 08:20:13 -0400
From: Iris Morelle <shadowm2006@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Wesnoth arbitrary code execution/sandbox escape

On Thursday, July 19, 2018 9:13:42 PM -04 you wrote:
> Hello,
> 
> We've found an issue in our software, "The Battle for Wesnoth", which allows
> arbitrary code execution by exploiting a vulnerability within the Lua
> scripting language engine which allows escaping existing sandbox measures
> in place and executing untrusted bytecode.

This has been assigned CVE-2018-1999023. The fix is shipped in the newly-
released version 1.14.4.

-- 
Regards
  Iris Morelle


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.