Bug 19784 - gnuchess new security issue CVE-2015-8972
Summary: gnuchess new security issue CVE-2015-8972
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/706844/
Whiteboard: MGA5-64-OK advisory
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2016-11-14 21:56 CET by David Walser
Modified: 2016-11-18 17:30 CET (History)
4 users (show)

See Also:
Source RPM: gnuchess-6.1.1-3.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2016-11-14 21:56:27 CET
A CVE has been assigned for a security issue fixed upstream in gnuchess:
http://openwall.com/lists/oss-security/2016/11/14/12

A freeze push request for gnuchess 6.2.4 has been sent.

Upstream patch checked into Mageia 5 SVN.
David Walser 2016-11-14 21:56:37 CET

CC: (none) => rverschelde

Comment 1 Marja Van Waes 2016-11-15 12:05:08 CET
Assigning to all packagers collectively, since there is no registered maintainer for this package.

CC: (none) => marja11
Assignee: bugsquad => pkg-bugs

Comment 2 David Walser 2016-11-15 21:35:07 CET
Patched package uploaded for Mageia 5.

Advisory:
========================

Updated gnuchess package fixes security vulnerability:

gnuchess before 6.2.4 is vulnerable to a stack buffer overflow related to user
move input, where 160 characters of input can crash gnuchess (CVE-2015-8972).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8972
http://openwall.com/lists/oss-security/2016/11/14/12
========================

Updated packages in core/updates_testing:
========================
gnuchess-6.1.1-3.1.mga5

from gnuchess-6.1.1-3.1.mga5.src.rpm

CC: rverschelde => (none)
Assignee: pkg-bugs => qa-bugs

Comment 3 Pana Sum 2016-11-17 19:42:34 CET
Tested on a 64 bits Mageia 5 installation, real hardware.

Using xboard front-end played a game gnuchess vs. gnuchess, before and after the update. The game finished with both versions.

CC: (none) => panasum

Dave Hodgins 2016-11-17 20:33:14 CET

Keywords: (none) => validated_update
Whiteboard: (none) => MGA5-64-OK advisory
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 4 Mageia Robot 2016-11-18 00:41:57 CET
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0390.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2016-11-18 17:30:00 CET

URL: (none) => http://lwn.net/Vulnerabilities/706844/


Note You need to log in before you can comment on or make changes to this bug.