Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in GNU Chess
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in GNU Chess
ID: USN-7336-1
Distribution: Ubuntu
Plattformen: Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10
Datum: Mo, 10. März 2025, 16:21
Referenzen: https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.22.04.1
https://www.cve.org/CVERecord?id=CVE-2021-30184
https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.24.10.1
https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.24.04.1
Applikationen: GNU Chess

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2537303179078478137==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------E179GDYlq2M831d7f6og0Gk5"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------E179GDYlq2M831d7f6og0Gk5
Content-Type: multipart/mixed;
boundary="------------7FFvICdmt5FCXp8IRarH2np9";
protected-headers="v1"
From: John Breton <john.breton@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <80be2d81-4045-4a61-8112-a58b2dec4467@canonical.com>
Subject: [USN-7336-1] GNU Chess vulnerability

--------------7FFvICdmt5FCXp8IRarH2np9
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7336-1
March 06, 2025

gnuchess vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS

Summary:

gnuchess could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- gnuchess: Plays a game of chess, either against the user or against itself

Details:

Michael Vaughan discovered an overflow vulnerability in GNU Chess that
occurs when reading a specially crafted Portable Game Notation (PGN)
file. An attacker could possibly use this issue to cause GNU Chess to
crash, resulting in a denial of service, or the execution of arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  gnuchess                        6.2.7-1+deb11u1build0.24.10.1

Ubuntu 24.04 LTS
  gnuchess                        6.2.7-1+deb11u1build0.24.04.1

Ubuntu 22.04 LTS
  gnuchess                        6.2.7-1+deb11u1build0.22.04.1

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7336-1
  CVE-2021-30184

Package Information:
https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.24.10.1
https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.24.04.1
https://launchpad.net/ubuntu/+source/gnuchess/6.2.7-1+deb11u1build0.22.04.1

--------------7FFvICdmt5FCXp8IRarH2np9--

--------------E179GDYlq2M831d7f6og0Gk5
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----

wsF5BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmfO+5sFAwAAAAAACgkQ8pSCVQZYHyjC
gA//UuiIOesXLp8JoXQqrUekj4LdGktiJJ+EmTZ8eN8qder2jTpK2EWoODNmnRhXQS7AKjXcPlGw
HC1VyLpwSTJjnHhFli7OE7hVfav2+RFYIyi4PrDqjIODAOTf3UazgVkcYaFdbyzdvRcst+CMr8OH
mUAuTvrmJ54uzbf4LmnohsMMOSEoC2NkQ8ml4KqbT4LNaZPJvcrH8GxH5DJW+Sq+AsXjSHUND5E4
Ko1wuBCpN06TxfnVOSUbbqvMGud1sfn9MaX6bDDV3VYucF8fRyV8i2d5txRtrSmCUhhVqpPq7p7n
nL92ukFfeAfjDujGXfCfwDrLzjAWPr22LJgS3BPDDpzjf3L8oMpKIulXnAjdXtyK/fGJuoFLe4+v
MYfWqxXS5GLAHn1VSEonGG71mpAoqMzkHLk5OAHQrLK6+2OFh1iqps0Lx/inQxD8qPZllAWV/9JP
av1Ad2MeW4MsjITLmXP0+vZuPWnzPZPyaQVCgypaqR5/bIS60X5vwpmGy1wcI9enBmbuAO5LmfNq
MM/prXX5641b2yqSSAgKlC1jiD4KXaWYfVRXcL53iVXlaA8WjmddISJCb+IyehD5vKEc7xp3RXIp
9+Utp9ff4R/a2oS0Thi8IzqgLxmKIOwhv/MIXlIhYKyd8xS6sOLJXidum+Sb7K3IZKlpq1Lto4HT
PKI=
=fB9X
-----END PGP SIGNATURE-----

--------------E179GDYlq2M831d7f6og0Gk5--


--===============2537303179078478137==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============2537303179078478137==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung