<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for freeciv</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2022:10096-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-08-24T02:33:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-08-24T02:33:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-08-24T02:33:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for freeciv</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for freeciv fixes the following issues:

- update to 3.0.3 (boo#1202548, CVE-2022-6083):

  * 3.0.3 is a bugfix release
  * see https://freeciv.fandom.com/wiki/NEWS-3.0.3 

- update to 3.0.2:

  * 3.0.2 is a generic bugfix release
  * see https://freeciv.fandom.com/wiki/NEWS-3.0.2 

- update to 3.0.1:

  * 3.0.1 is a generic bugfix release
  * see https://freeciv.fandom.com/wiki/NEWS-3.0.1 

- update to 3.0.0:

  * This release is a major upgrade which with some changes that
    can support backward compatible rulesets
  * see https://freeciv.fandom.com/wiki/NEWS-3.0.0#WHAT.27S_CHANGED_SINCE_2.6

- update to 2.6.6:

  * https://freeciv.fandom.com/wiki/NEWS-2.6.5
  * 2.6.6 is a bugfix release.

- update to 2.6.5:

  * https://freeciv.fandom.com/wiki/NEWS-2.6.5
  * 2.6.5 is a bugfix release. Notably it fixes regression in 2.6.4 gtk3-client
    that present units in city dialog had no overlays drawn at all. 

- Update to 2.6.4:

  * Bugfix release, see https://freeciv.fandom.com/wiki/NEWS-2.6.4

- update to 2.6.3:

  * see http://www.freeciv.org/wiki/NEWS-2.6.3
  * Fixed trouble when a new city is founded to the ruins of a former city,
    and that new city establish a trade route with a player who had seen
    former city, and is unaware that it had been destroyed HRM#871606
  * Fixed a case where shared vision did not completely update
    recipient's map HRM#846106
  * Fixed a bug where one could paradrop to peaceful nation's territory
    after continuing game from an old savegame HRM#879084
  * Fixed a bug causing game sometimes to tell wrong reason of why an
    action failed HRM#879880
  * Cease fire no longer runs out with an already dead player, making his
    former allies to hate the alive party of the treaty HRM#879055
  * Made server not to end in a infinite loop after loading savegame with
    too high phase number. Such a savegame was reported to be created
    after spaceship was launched but game was still continued HRM#815196
  * Unified writing of the city name Washington-on-the-Brazos
    between rulesets, so it doesn't appear multiple times in the same
    game in a bit different form HRM#867817
  * Stealth units are no longer erroneously hidden even from allies
    HRM#764976
  * Placing initial units is now done in shuffled player order HRM#850656
  * Corrupt worker tasks are cleared. Those can originate, e.g.,
    from buggy pre-2.6.2.1 Qt-client, and live in old savegames HRM#901938
  * In a ruleset, such as civ2civ3, where caravans can help building wonder
    in a foreign city, refresh city info of the city owner when one does
    HRM#907977
  * Display of success probabilities for diplomats was off when targeting
    stack of units instead of individual unit HRM#859761
  * Fixed pillaging of extras that are caused by something else than
    player actions. For the fix to work, both server and client must be
    at least version 2.6.3 HRM#861508
  * Civilian unit trying to paradrop to an enemy city dies HRM#870004
  * Prevented dead player from getting techs via Tech_Parasite effect.
    This caused trouble in alien ruleset where Tech_Parasite is granted
     by a tech HRM#873692
  * Improved support of CityTile requirement type HRM#877780
  * Fixed trouble preventing Small Wonders from working as impr_reqs
    for units HRM#884993
  * Corrected success probability shown by action dialog when it depends
    on a special kind of road HRM#897490
  * The included Lua engine has been upgraded from 5.3.5 to 5.3.6. HRM#889425

- update to 2.6.2.1:

  * Fixed server crash when unit with zero move_rate is transformed
  * Fixed crashes when using Direction objects in lua scripts 
  * Fixed crash when chatline text had opening tag without closing tag
  * Fixes to the Qt client
  * Updated translations
  * Fixed Qt-client build against Qt-5.15 (removes freeciv-qt-5.15.patch )
  * Documentation updates 

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2022-10096</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGIIGXHCBJ6BXOPVIKR6NCU4TUBJIYLP/</URL>
      <Description>E-Mail link for openSUSE-SU-2022:10096-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1202548</URL>
      <Description>SUSE Bug 1202548</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-6083/</URL>
      <Description>SUSE CVE CVE-2022-6083 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP3">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP3">
        <FullProductName ProductID="SUSE Package Hub 15 SP3">SUSE Package Hub 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="freeciv-3.0.3-bp153.2.3.1">
      <FullProductName ProductID="freeciv-3.0.3-bp153.2.3.1">freeciv-3.0.3-bp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeciv-gtk3-3.0.3-bp153.2.3.1">
      <FullProductName ProductID="freeciv-gtk3-3.0.3-bp153.2.3.1">freeciv-gtk3-3.0.3-bp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeciv-lang-3.0.3-bp153.2.3.1">
      <FullProductName ProductID="freeciv-lang-3.0.3-bp153.2.3.1">freeciv-lang-3.0.3-bp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="freeciv-qt-3.0.3-bp153.2.3.1">
      <FullProductName ProductID="freeciv-qt-3.0.3-bp153.2.3.1">freeciv-qt-3.0.3-bp153.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="freeciv-3.0.3-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:freeciv-3.0.3-bp153.2.3.1">freeciv-3.0.3-bp153.2.3.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeciv-gtk3-3.0.3-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:freeciv-gtk3-3.0.3-bp153.2.3.1">freeciv-gtk3-3.0.3-bp153.2.3.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeciv-lang-3.0.3-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:freeciv-lang-3.0.3-bp153.2.3.1">freeciv-lang-3.0.3-bp153.2.3.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeciv-qt-3.0.3-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:freeciv-qt-3.0.3-bp153.2.3.1">freeciv-qt-3.0.3-bp153.2.3.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeciv-3.0.3-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:freeciv-3.0.3-bp153.2.3.1">freeciv-3.0.3-bp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeciv-gtk3-3.0.3-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:freeciv-gtk3-3.0.3-bp153.2.3.1">freeciv-gtk3-3.0.3-bp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeciv-lang-3.0.3-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:freeciv-lang-3.0.3-bp153.2.3.1">freeciv-lang-3.0.3-bp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="freeciv-qt-3.0.3-bp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:freeciv-qt-3.0.3-bp153.2.3.1">freeciv-qt-3.0.3-bp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2022-6083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP3:freeciv-3.0.3-bp153.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:freeciv-gtk3-3.0.3-bp153.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:freeciv-lang-3.0.3-bp153.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:freeciv-qt-3.0.3-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:freeciv-3.0.3-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:freeciv-gtk3-3.0.3-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:freeciv-lang-3.0.3-bp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:freeciv-qt-3.0.3-bp153.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGIIGXHCBJ6BXOPVIKR6NCU4TUBJIYLP/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-6083.html</URL>
        <Description>CVE-2022-6083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202548</URL>
        <Description>SUSE Bug 1202548</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
