private file disclosure issue (CVE-2015-0844)
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| trusty-backports |
Undecided
|
Unassigned | |||
| utopic-backports |
Undecided
|
Unassigned | |||
| wesnoth-1.10 (Ubuntu) |
Undecided
|
Unassigned | |||
| Precise |
Undecided
|
Unassigned | |||
| Trusty |
Undecided
|
Unassigned | |||
| Utopic |
Undecided
|
Unassigned | |||
| wesnoth-1.12 (Ubuntu) |
Undecided
|
Unassigned | |||
| Precise |
Undecided
|
Unassigned | |||
| Trusty |
Undecided
|
Unassigned | |||
| Utopic |
Undecided
|
Unassigned | |||
Bug Description
See https:/
I'm currently in the process of creating the patches, will attach them later. :)
CVE References
| Rhonda D'Vine (rhonda) wrote : | #1 |
| tags: | added: patch |
| Rhonda D'Vine (rhonda) wrote : | #2 |
| Rhonda D'Vine (rhonda) wrote : | #3 |
| Seth Arnold (seth-arnold) wrote : | #4 |
| Launchpad Janitor (janitor) wrote : | #5 |
This bug was fixed in the package wesnoth-1.10 - 1:1.10.2-1ubuntu1
---------------
wesnoth-1.10 (1:1.10.2-1ubuntu1) precise-security; urgency=low
* SECURITY UPDATE: Pull af61f9fd from upstream to fix "Private file
disclosure through get_wml_location()" (LP: #1445688)
- CVE-2015-0844
-- Rhonda D'Vine <email address hidden> Fri, 17 Apr 2015 23:57:16 +0200
| Changed in wesnoth-1.10 (Ubuntu Precise): | |
| status: | New → Fix Released |
| Launchpad Janitor (janitor) wrote : | #6 |
This bug was fixed in the package wesnoth-1.10 - 1:1.10.
---------------
wesnoth-1.10 (1:1.10.
* SECURITY UPDATE: Pull af61f9fd from upstream to fix "Private file
disclosure through get_wml_location()" (LP: #1445688)
- CVE-2015-0844
-- Rhonda D'Vine <email address hidden> Fri, 17 Apr 2015 23:57:16 +0200
| Changed in wesnoth-1.10 (Ubuntu Utopic): | |
| status: | New → Fix Released |
| Launchpad Janitor (janitor) wrote : | #7 |
This bug was fixed in the package wesnoth-1.10 - 1:1.10.
---------------
wesnoth-1.10 (1:1.10.
* SECURITY UPDATE: Pull af61f9fd from upstream to fix "Private file
disclosure through get_wml_location()" (LP: #1445688)
- CVE-2015-0844
-- Rhonda D'Vine <email address hidden> Fri, 17 Apr 2015 23:57:16 +0200
| Changed in wesnoth-1.10 (Ubuntu Trusty): | |
| status: | New → Fix Released |
| Seth Arnold (seth-arnold) wrote : | #8 |
Thanks Rhonda, the fixes are released.
| Marc Deslauriers (mdeslaur) wrote : | #9 |
This is fixed already in vivid, closing bug.
| Changed in wesnoth-1.10 (Ubuntu): | |
| status: | New → Fix Released |
| Launchpad Janitor (janitor) wrote : | #10 |
Status changed to 'Confirmed' because the bug affects multiple users.
| Changed in wesnoth-1.12 (Ubuntu Precise): | |
| status: | New → Confirmed |
| Changed in wesnoth-1.12 (Ubuntu Trusty): | |
| status: | New → Confirmed |
| Changed in wesnoth-1.12 (Ubuntu Utopic): | |
| status: | New → Confirmed |
| Changed in wesnoth-1.12 (Ubuntu): | |
| status: | New → Confirmed |
| Steve Beattie (sbeattie) wrote : | #14 |
For wesnoth-1.12, this was fixed with the 1:1.12.2-1 upload, which is both in vivid and wily, closing the tasks there. Precise does not have the package at all. For trusty and utopic, these packages were provided by the ubuntu-backports project https:/
| Changed in wesnoth-1.12 (Ubuntu): | |
| status: | Confirmed → Fix Released |
| Changed in wesnoth-1.12 (Ubuntu Utopic): | |
| status: | Confirmed → Fix Released |
| status: | Fix Released → Invalid |
| Changed in wesnoth-1.12 (Ubuntu Trusty): | |
| status: | Confirmed → Invalid |
| Changed in wesnoth-1.12 (Ubuntu Precise): | |
| status: | Confirmed → Invalid |
| anatoly techtonik (techtonik) wrote : | #15 |
Sorry, this security issue is not fixed for trusty yet.
| Changed in wesnoth-1.12 (Ubuntu Trusty): | |
| status: | Invalid → New |
| anatoly techtonik (techtonik) wrote : | #16 |
I don't understand what I need to do on this page https:/
| Daniel Holbach (dholbach) wrote : | #17 |
You might have to file a bug on https:/
| Changed in wesnoth-1.12 (Ubuntu Trusty): | |
| status: | New → Fix Released |
| anatoly techtonik (techtonik) wrote : | #18 |
@dholbach, but this a lie - https:/
I didn't find a way to add trusty-backports as affected by this bug. It is either because you changed permissions, or because there is no such feature in LaunchPad?
| Scott Kitterman (kitterman) wrote : | #19 |
No. It's not a lie. Trusty backports bugs are not handled within the Ubuntu project tasks, but under a separate project that I've added now. What it is, is someone rushing to make an accusation because they don't understand how the project is managed.
As described in https:/
| Changed in trusty-backports: | |
| status: | New → Confirmed |
| Changed in wesnoth-1.12 (Ubuntu Trusty): | |
| status: | Fix Released → Invalid |
| anatoly techtonik (techtonik) wrote : Re: [Bug 1445688] Re: private file disclosure issue (CVE-2015-0844) | #20 |
On Fri, May 15, 2015 at 9:23 AM, Scott Kitterman <email address hidden> wrote:
> No. It's not a lie. Trusty backports bugs are not handled within the
> Ubuntu project tasks, but under a separate project that I've added now.
> What it is, is someone rushing to make an accusation because they don't
> understand how the project is managed.
The lie is to say that fix for Wesnoth 1.12 Trusty is released.
Because it is not.
> As described in https:/
> someone needs to verify that the newer backport builds, installs, and
> runs on trusty. Once that's done, I'll be glad to upload it.
This is also not true. This page doesn't describe how to verify that.
| Micah Gersten (micahg) wrote : | #21 |
I filed Bug #1456775 which has all the information for testing and a link to my PPA where packages are building to test.
| Micah Gersten (micahg) wrote : | #22 |
Sorry, this is for trusty and utopic backports


Thanks; I reformatted the changelogs slightly for consistency with our other security updates and so that this bug will be automatically closed when the packages are released; the packages are building now, and I should release them tomorrow if the builds succeed on the build servers.
Thanks!