Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 711264 (CVE-2019-15767) - games-board/gnuchess: Buffer overflow (CVE-2019-15767)
Summary: games-board/gnuchess: Buffer overflow (CVE-2019-15767)
Status: IN_PROGRESS
Alias: CVE-2019-15767
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://lists.gnu.org/archive/html/bu...
Whiteboard: B2 [ebuild cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-03-01 23:47 UTC by Sam James (sec padawan)
Modified: 2020-04-19 22:19 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James (sec padawan) 2020-03-01 23:47:21 UTC
Description:
"In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load function in frontend/cmd.cc via a crafted chess position in an EPD file."
Comment 1 Sam James (sec padawan) 2020-04-19 08:19:10 UTC
@maintainer(s), please create an ebuild for version 6.2.6 (just released) which contains a fix for this.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2020-04-19 22:19:38 UTC
CVE-2019-15767 (https://nvd.nist.gov/vuln/detail/CVE-2019-15767):
  In GNU Chess 6.2.5, there is a stack-based buffer overflow in the cmd_load
  function in frontend/cmd.cc via a crafted chess position in an EPD file.