GNU bug report logs -
#47729
CVE-2021-30184 Arbitrary code execution in GNU Chess [security]
Previous Next
Reported by: Maxime Devos <maximedevos <at> telenet.be>
Date: Mon, 12 Apr 2021 15:45:01 UTC
Severity: normal
Tags: security
Done: Maxime Devos <maximedevos <at> telenet.be>
Bug is archived. No further changes may be made.
Full log
View this message in rfc822 format
[Message part 1 (text/plain, inline)]
From https://nvd.nist.gov/vuln/detail/CVE-2021-30184:
GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN
(Portable Game Notation) data. This is related to a buffer overflow in the use
of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in
frontend/cmd.cc.
Upstream bug report and patch:
https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html
Upstream is aware of this issue and patch. The patch is being reviewed upstream:
Response by Antonio Ceballos (<https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html>)
‘We will review it all in detail for a future release fixing the problem.’
I believe we should simply wait for upstream to make a release.
[signature.asc (application/pgp-signature, inline)]
This bug report was last modified 4 years and 9 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.