drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in GNU Chess
| Name: |
Ausführen beliebiger Kommandos in GNU Chess |
|
| ID: |
USN-7336-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
| Datum: |
Mo, 10. März 2025, 16:21 |
|
| Referenzen: |
https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.22.04.1
https://www.cve.org/CVERecord?id=CVE-2021-30184
https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.24.10.1
https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.24.04.1 |
|
| Applikationen: |
GNU Chess |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2537303179078478137== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------E179GDYlq2M831d7f6og0Gk5"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------E179GDYlq2M831d7f6og0Gk5 Content-Type: multipart/mixed; boundary="------------7FFvICdmt5FCXp8IRarH2np9"; protected-headers="v1" From: John Breton <john.breton@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <80be2d81-4045-4a61-8112-a58b2dec4467@canonical.com> Subject: [USN-7336-1] GNU Chess vulnerability
--------------7FFvICdmt5FCXp8IRarH2np9 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7336-1 March 06, 2025
gnuchess vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS
Summary:
gnuchess could be made to crash or run programs as your login if it opened a specially crafted file.
Software Description: - gnuchess: Plays a game of chess, either against the user or against itself
Details:
Michael Vaughan discovered an overflow vulnerability in GNU Chess that occurs when reading a specially crafted Portable Game Notation (PGN) file. An attacker could possibly use this issue to cause GNU Chess to crash, resulting in a denial of service, or the execution of arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 gnuchess 6.2.7-1+deb11u1build0.24.10.1
Ubuntu 24.04 LTS gnuchess 6.2.7-1+deb11u1build0.24.04.1
Ubuntu 22.04 LTS gnuchess 6.2.7-1+deb11u1build0.22.04.1
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7336-1 CVE-2021-30184
Package Information: https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.24.10.1 https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.24.04.1 https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.22.04.1
--------------7FFvICdmt5FCXp8IRarH2np9--
--------------E179GDYlq2M831d7f6og0Gk5 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmfO+5sFAwAAAAAACgkQ8pSCVQZYHyjC gA//UuiIOesXLp8JoXQqrUekj4LdGktiJJ+EmTZ8eN8qder2jTpK2EWoODNmnRhXQS7AKjXcPlGw HC1VyLpwSTJjnHhFli7OE7hVfav2+RFYIyi4PrDqjIODAOTf3UazgVkcYaFdbyzdvRcst+CMr8OH mUAuTvrmJ54uzbf4LmnohsMMOSEoC2NkQ8ml4KqbT4LNaZPJvcrH8GxH5DJW+Sq+AsXjSHUND5E4 Ko1wuBCpN06TxfnVOSUbbqvMGud1sfn9MaX6bDDV3VYucF8fRyV8i2d5txRtrSmCUhhVqpPq7p7n nL92ukFfeAfjDujGXfCfwDrLzjAWPr22LJgS3BPDDpzjf3L8oMpKIulXnAjdXtyK/fGJuoFLe4+v MYfWqxXS5GLAHn1VSEonGG71mpAoqMzkHLk5OAHQrLK6+2OFh1iqps0Lx/inQxD8qPZllAWV/9JP av1Ad2MeW4MsjITLmXP0+vZuPWnzPZPyaQVCgypaqR5/bIS60X5vwpmGy1wcI9enBmbuAO5LmfNq MM/prXX5641b2yqSSAgKlC1jiD4KXaWYfVRXcL53iVXlaA8WjmddISJCb+IyehD5vKEc7xp3RXIp 9+Utp9ff4R/a2oS0Thi8IzqgLxmKIOwhv/MIXlIhYKyd8xS6sOLJXidum+Sb7K3IZKlpq1Lto4HT PKI= =fB9X -----END PGP SIGNATURE-----
--------------E179GDYlq2M831d7f6og0Gk5--
--===============2537303179078478137== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============2537303179078478137==--
|
|
|
|