Bug 1184541 - (CVE-2021-30184) VUL-0: CVE-2021-30184: gnuchess: allows to execute arbitrary code via crafted PGN data via cmd_pgnload() and cmd_pgnreplay()
(CVE-2021-30184)
VUL-0: CVE-2021-30184: gnuchess: allows to execute arbitrary code via crafted...
Status: IN_PROGRESS
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.2
Other Other
: P3 - Medium : Minor (vote)
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/281307/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-04-09 07:34 UTC by Robert Frohl
Modified: 2021-06-01 09:15 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2021-04-09 07:34:31 UTC
CVE-2021-30184

GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN
(Portable Game Notation) data. This is related to a buffer overflow in the use
of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in
frontend/cmd.cc.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30184
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30184
https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html
https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html
Comment 2 Matej Cepl 2021-06-01 09:15:55 UTC
Should be fixed at least with https://build.opensuse.org/package/rdiff/games/gnuchess?linkrev=base&rev=35