(address . bug-guix@gnu.org)
GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN
(Portable Game Notation) data. This is related to a buffer overflow in the use
of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in
frontend/cmd.cc.
Upstream bug report and patch:
Upstream is aware of this issue and patch. The patch is being reviewed upstream:
Response by Antonio Ceballos (https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html)
‘We will review it all in detail for a future release fixing the problem.’
I believe we should simply wait for upstream to make a release.
-----BEGIN PGP SIGNATURE-----
iI0EABYKADUWIQTB8z7iDFKP233XAR9J4+4iGRcl7gUCYHRq2BccbWF4aW1lZGV2
b3NAdGVsZW5ldC5iZQAKCRBJ4+4iGRcl7o76AP9ixzfK48MaqYYWx/Y93dKzqyTW
jgm+sOJe25bU3sTNDgEA5XWV+sZ56Ptxz6rSG88YRQlkBa4bATPktp3Wjt1FqQY=
=Va44
-----END PGP SIGNATURE-----