The wesnoth upstream reported that python support exposes users to potential security issues. Here's a link to their mailing list: https://mail.gna.org/public/wesnoth-dev/2009-02/msg00036.html
Python support has been disabled, the packages rev-bumped to force out the change and the old ebuilds with python enabled removed from portage.
Could be finalized and closed afaict.
*** Bug 261282 has been marked as a duplicate of this bug. ***
CVE-2009-0367 is fixed in 1.5.11, according to http://www.wesnoth.org/forum/viewtopic.php?t=24247
before closing, we need to investigate attack vectors and impact for a rating and decide on a GLSA.
I vote yes on a GLSA fwiw.
The read_game_map function in src/terrain_translation.cpp in Wesnoth
before r32987 allows remote attackers to cause a denial of service
(memory consumption and daemon hang) via a map with a large (1) width
or (2) height.
Sorry, wrong bug nr for CVE...
This bug can be closed out
game crash, I vote NO.
NO, too. Closing.