GNU bug report logs - #47729
CVE-2021-30184 Arbitrary code execution in GNU Chess [security]

Previous Next

Package: guix;

Reported by: Maxime Devos <maximedevos <at> telenet.be>

Date: Mon, 12 Apr 2021 15:45:01 UTC

Severity: normal

Tags: security

Done: Maxime Devos <maximedevos <at> telenet.be>

Bug is archived. No further changes may be made.

Full log


View this message in rfc822 format

From: help-debbugs <at> gnu.org (GNU bug Tracking System)
To: Maxime Devos <maximedevos <at> telenet.be>
Subject: bug#47729: closed (Fixed: CVE-2021-30184 Arbitrary code execution
 in GNU Chess [security])
Date: Mon, 10 May 2021 19:50:02 +0000
[Message part 1 (text/plain, inline)]
Your bug report

#47729: CVE-2021-30184 Arbitrary code execution in GNU Chess [security]

which was filed against the guix package, has been closed.

The explanation is attached below, along with your original report.
If you require more details, please reply to 47729 <at> debbugs.gnu.org.

-- 
47729: http://debbugs.gnu.org/cgi/bugreport.cgi?bug=47729
GNU Bug Tracking System
Contact help-debbugs <at> gnu.org with problems
[Message part 2 (message/rfc822, inline)]
From: Maxime Devos <maximedevos <at> telenet.be>
To: 47729-done <at> debbugs.gnu.org
Subject: Fixed: CVE-2021-30184 Arbitrary code execution in GNU Chess [security]
Date: Mon, 10 May 2021 21:48:55 +0200
Fixed with https://git.savannah.gnu.org/cgit/guix.git/commit/?id=9a11f2380ff49756ace2f33bc96a88cdb6af5453.



[Message part 3 (message/rfc822, inline)]
From: Maxime Devos <maximedevos <at> telenet.be>
To: bug-guix <at> gnu.org
Subject: CVE-2021-30184 Arbitrary code execution in GNU Chess [security]
Date: Mon, 12 Apr 2021 17:44:24 +0200
[Message part 4 (text/plain, inline)]
From https://nvd.nist.gov/vuln/detail/CVE-2021-30184:

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN
(Portable Game Notation) data. This is related to a buffer overflow in the use
of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in
frontend/cmd.cc.

Upstream bug report and patch:
https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html

Upstream is aware of this issue and patch.  The patch is being reviewed upstream:

Response by Antonio Ceballos (<https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html>)
‘We will review it all in detail for a future release fixing the problem.’

I believe we should simply wait for upstream to make a release.
[signature.asc (application/pgp-signature, inline)]

This bug report was last modified 4 years and 8 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.