Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in gnuchess
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in gnuchess
ID: FEDORA-2020-3eaf264c4b
Distribution: Fedora
Plattformen: Fedora 30
Datum: Mo, 27. April 2020, 07:13
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=1825541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15767
Applikationen: GNU Chess

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2020-3eaf264c4b
2020-04-27 03:06:12.192800
-------------------------------------------------------------------------------
-

Name : gnuchess
Product : Fedora 30
Version : 6.2.6
Release : 1.fc30
URL : ftp://ftp.gnu.org/pub/gnu/chess/
Summary : The GNU chess program
Description :
The gnuchess package contains the GNU chess program. By default,
GNU chess uses a curses text-based interface. Alternatively, GNU chess
can be used in conjunction with the xboard user interface and the X
Window System for play using a graphical chess board.

Install the gnuchess package if you would like to play chess on your
computer. If you'd like to use a graphical interface with GNU chess,
you'll also need to install the xboard package and the X Window System.

-------------------------------------------------------------------------------
-
Update Information:

6.2.6
-------------------------------------------------------------------------------
-
ChangeLog:

* Sun Apr 19 2020 Gwyn Ciesla <gwync@protonmail.com> - 6.2.6-1
- 6.2.6
* Tue Jan 28 2020 Fedora Release Engineering <releng@fedoraproject.org> -
6.2.5-10
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> -
6.2.5-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1749177 - CVE-2019-15767 gnuchess: stack-based overflow in
cmd_load in frontend/cmd.cc via crafted EPD file [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1749177
[ 2 ] Bug #1749178 - CVE-2019-15767 gnuchess: stack-based overflow in
cmd_load in frontend/cmd.cc via crafted EPD file [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1749178
[ 3 ] Bug #1825541 - gnuchess-6.2.6 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1825541
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2020-3eaf264c4b' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung