GNU bug report logs

#47729 CVE-2021-30184 Arbitrary code execution in GNU Chess [security]

PackageSource(s)Maintainer(s)
guix PTS Buildd Popcon
Reply or subscribe to this bug. View this bug as an mbox, status mbox, or maintainer mbox

Report forwarded to bug-guix@gnu.org:
bug#47729; Package guix. (Mon, 12 Apr 2021 15:45:02 GMT) (full text, mbox, link).


Acknowledgement sent to Maxime Devos <maximedevos@telenet.be>:
New bug report received and forwarded. Copy sent to bug-guix@gnu.org. (Mon, 12 Apr 2021 15:45:02 GMT) (full text, mbox, link).


Message #5 received at submit@debbugs.gnu.org (full text, mbox, reply):

From: Maxime Devos <maximedevos@telenet.be>
To: bug-guix@gnu.org
Subject: CVE-2021-30184 Arbitrary code execution in GNU Chess [security]
Date: Mon, 12 Apr 2021 17:44:24 +0200
[Message part 1 (text/plain, inline)]
From https://nvd.nist.gov/vuln/detail/CVE-2021-30184:

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN
(Portable Game Notation) data. This is related to a buffer overflow in the use
of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in
frontend/cmd.cc.

Upstream bug report and patch:
https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html

Upstream is aware of this issue and patch.  The patch is being reviewed upstream:

Response by Antonio Ceballos (<https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html>)
‘We will review it all in detail for a future release fixing the problem.’

I believe we should simply wait for upstream to make a release.
[signature.asc (application/pgp-signature, inline)]

Added tag(s) security. Request was from Maxime Devos <maximedevos@telenet.be> to control@debbugs.gnu.org. (Mon, 12 Apr 2021 20:32:02 GMT) (full text, mbox, link).


Reply sent to Maxime Devos <maximedevos@telenet.be>:
You have taken responsibility. (Mon, 10 May 2021 19:50:01 GMT) (full text, mbox, link).


Notification sent to Maxime Devos <maximedevos@telenet.be>:
bug acknowledged by developer. (Mon, 10 May 2021 19:50:02 GMT) (full text, mbox, link).


Message #12 received at 47729-done@debbugs.gnu.org (full text, mbox, reply):

From: Maxime Devos <maximedevos@telenet.be>
To: 47729-done@debbugs.gnu.org
Subject: Fixed: CVE-2021-30184 Arbitrary code execution in GNU Chess [security]
Date: Mon, 10 May 2021 21:48:55 +0200
Fixed with https://git.savannah.gnu.org/cgit/guix.git/commit/?id=9a11f2380ff49756ace2f33bc96a88cdb6af5453.






bug archived. Request was from Debbugs Internal Request <help-debbugs@gnu.org> to internal_control@debbugs.gnu.org. (Tue, 08 Jun 2021 11:24:05 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


debbugs.gnu.org maintainers <help-debbugs@gnu.org>. Last modified: Sat Dec 21 16:45:44 2024; Machine Name: wallace-server

GNU bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.