|Category:||Mageia Linux Local Security Checks|
|Title:||Mageia Linux Local Check: mgasa-2015-0283|
|Summary:||Mageia Linux Local Security Checks mgasa-2015-0283|
Mageia Linux Local Security Checks mgasa-2015-0283
Toom Lhmus discovered that the Lua API and preprocessor in the Battle
for Wesnoth game up to version 1.12.2 included could lead to client-side authentication information disclosure
using maliciously crafted files with the .pdb extension (CVE-2015-5069, CVE-2015-5070).
This issue has been fixed in version 1.12.4, which also provides a number of engine and gameplay-related bug fixes.
See the referenced code and player changelogs for a detailed listing.
Update the affected packages to the latest available version.
Common Vulnerability Exposure (CVE) ID: CVE-2015-5069|
BugTraq ID: 75424
Common Vulnerability Exposure (CVE) ID: CVE-2015-5070
BugTraq ID: 75425
|Copyright||Copyright (C) 2015 Eero Volotinen|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.