CVE description: The read_game_map function in src/terrain_translation.cpp in Wesnoth before r32987 allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a map with a large (1) width or (2) height.
Debian patch: http://patch-tracking.debian.net/patch/series/view/wesnoth/1:1.4.7-4/05limit-mapsize
This belongs here, sorry: CVE-2009-0878 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0878): The read_game_map function in src/terrain_translation.cpp in Wesnoth before r32987 allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a map with a large (1) width or (2) height.
Games, is 1.6.1 ready to be stabilized?
It was added 2009-04-12, so no.
wesnoth-1.4.7-r1 is gone now.
Security team, please do close this out.