Bugzilla – Bug 1184541
VUL-0: CVE-2021-30184: gnuchess: allows to execute arbitrary code via crafted PGN data via cmd_pgnload() and cmd_pgnreplay()
Last modified: 2021-06-01 09:15:55 UTC
CVE-2021-30184 GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30184 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30184 https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html
https://bugzilla.redhat.com/show_bug.cgi?id=1947594
Should be fixed at least with https://build.opensuse.org/package/rdiff/games/gnuchess?linkrev=base&rev=35