vulnerability
Arch Linux: Arbitrary code execution (CVE-2021-30184)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Apr 7, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Apr 7, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-30184
- https://attackerkb.com/topics/CVE-2021-30184
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QC74RWMDLSQGV6Z3ZABNTPABB33S4YNF/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOGPLC77ZL2FACSOE5MWDS3YH3RBNQAQ/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXOTMUSBVUZNA3JMPG6BU37DQW2YOJWS/
- URL-https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00000.html
- URL-https://lists.gnu.org/archive/html/bug-gnu-chess/2021-04/msg00001.html
- URL-https://security.gentoo.org/glsa/202107-28
- CWE-120
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.