MGASA-2023-0150

Source
https://advisories.mageia.org/MGASA-2023-0150.html
Import Source
https://advisories.mageia.org/MGASA-2023-0150.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0150
Related
Published
2023-04-24T00:20:26Z
Modified
2023-04-23T23:09:21Z
Summary
Updated squirrel/supertux packages fix security vulnerability
Details

sqclass.cpp in Squirrel 3.1 allows an out-of-bounds read (in the core interpreter) that can lead to Code Execution. If a victim executes an attacker-controlled squirrel script, it is possible for the attacker to break out of the squirrel script sandbox even if all dangerous functionality such as File System functions has been disabled. An attacker might abuse this bug to target (for example) Cloud services that allow customization via SquirrelScripts, or distribute malware through video games that embed a Squirrel Engine. (CVE-2021-41556)

supertux has been rebuilt as it uses a bundled copy of squirrel.

References
Credits

Affected packages

Mageia:8 / squirrel

Package

Name
squirrel
Purl
pkg:rpm/mageia/squirrel?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2-1.mga8

Ecosystem specific

{
    "section": "core"
}

Mageia:8 / supertux

Package

Name
supertux
Purl
pkg:rpm/mageia/supertux?arch=source&distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.2-4.2.mga8

Ecosystem specific

{
    "section": "core"
}