Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.
{ "ubuntu_priority": "negligible" }
{ "availability": "No subscription required", "ubuntu_priority": "negligible", "binaries": [ { "binary_version": "6.2.5-1", "binary_name": "gnuchess" }, { "binary_version": "6.2.5-1", "binary_name": "gnuchess-dbgsym" } ] }