The following two updates has been released for Debian 6 LTS:
[DLA 296-1] extplorer security update
[DLA 297-1] wesnoth-1.8 security update
[DLA 296-1] extplorer security update
[DLA 297-1] wesnoth-1.8 security update
[DLA 296-1] extplorer security update
Package : extplorer
Version : 2.1.0b6+dfsg.2-1+squeeze3
CVE ID : CVE-2015-0896
Multiple cross-site scripting (XSS) vulnerabilities in eXtplorer before
2.1.7 allow remote attackers to inject arbitrary web script or HTML via
unspecified vectors.
[DLA 297-1] wesnoth-1.8 security update
Package : wesnoth-1.8
Version : 1:1.8.5-1+deb6u2
CVE ID : CVE-2015-5069 CVE-2015-5070
Wesnoth implements a text preprocessing language that is used in
conjunction with its own game scripting language. It also has a
built-in Lua interpreter and API.
Both the Lua API and the preprocessor make use of the same function
(filesystem::get_wml_location()) to resolve file paths so that only
content from the user's data directory can be read.
However, the function did not explicitly disallow files with the .pbl
extension. The contents of these files could thus be stored in saved
game files or even transmitted directly to other users in a networked
game. Among the information that's compromised is a user-defined
passphrase used to authenticate uploads to the game's content server.