GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmdpgnload and cmdpgnreplay functions in frontend/cmd.cc.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.7-1+deb11u1build0.22.04.1", "binary_name": "gnuchess" }, { "binary_version": "6.2.7-1+deb11u1build0.22.04.1", "binary_name": "gnuchess-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.7-1+deb11u1build0.24.10.1", "binary_name": "gnuchess" }, { "binary_version": "6.2.7-1+deb11u1build0.24.10.1", "binary_name": "gnuchess-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.7-1+deb11u1build0.24.04.1", "binary_name": "gnuchess" }, { "binary_version": "6.2.7-1+deb11u1build0.24.04.1", "binary_name": "gnuchess-dbgsym" } ] }