Debian Package Tracker
Register | Log in
Subscribe

gnuchess

Plays a game of chess, either against the user or against itself

Choose email to subscribe with

general
  • source: gnuchess (main)
  • version: 6.2.7-1
  • maintainer: Vincent Legout (DMD)
  • arch: any
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 6.2.4-1
  • oldstable: 6.2.5-1
  • stable: 6.2.7-1
  • testing: 6.2.7-1
  • unstable: 6.2.7-1
versioned links
  • 6.2.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.2.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.2.7-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • gnuchess (9 bugs: 0, 8, 1, 0)
action needed
A new upstream version is available: 6.2.9 high
A new upstream version 6.2.9 is available, you should consider packaging it.
Created: 2021-05-12 Last update: 2022-08-09 11:33
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2021-30184: GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2021-30184: GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 low-priority security issue in bullseye low

There is 1 open security issue in bullseye.

1 issue left for the package maintainer to handle:
  • CVE-2021-30184: (needs triaging) GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.

You can find information about how to handle this issue in the security team's documentation.

Created: 2022-07-04 Last update: 2022-08-01 13:40
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2020-10-29] gnuchess 6.2.7-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-24] Accepted gnuchess 6.2.7-1 (source) into unstable (Vincent Legout)
  • [2017-08-07] gnuchess 6.2.5-1 MIGRATED to testing (Debian testing watch)
  • [2017-08-01] Accepted gnuchess 6.2.5-1 (source) into unstable (Vincent Legout)
  • [2016-11-16] gnuchess 6.2.4-1 MIGRATED to testing (Debian testing watch)
  • [2016-11-11] Accepted gnuchess 6.2.4-1 (source) into unstable (Vincent Legout)
  • [2016-09-11] gnuchess 6.2.2-2 MIGRATED to testing (Debian testing watch)
  • [2016-09-05] Accepted gnuchess 6.2.2-2 (source) into unstable (Vincent Legout)
  • [2016-01-16] gnuchess 6.2.2-1 MIGRATED to testing (Debian testing watch)
  • [2016-01-10] Accepted gnuchess 6.2.2-1 (source) into unstable (Vincent Legout)
  • [2015-06-01] Accepted gnuchess 6.2.1-1 (source amd64) into unstable (Vincent Legout)
  • [2014-08-07] gnuchess 6.1.2-1 MIGRATED to testing (Britney)
  • [2014-08-01] Accepted gnuchess 6.1.2-1 (source amd64) into unstable (Vincent Legout)
  • [2014-01-11] gnuchess 6.1.1-1 MIGRATED to testing (Debian testing watch)
  • [2013-12-31] Accepted gnuchess 6.1.1-1 (source amd64) (Vincent Legout)
  • [2013-05-25] gnuchess 6.0.3-1 MIGRATED to testing (Debian testing watch)
  • [2013-05-14] Accepted gnuchess 6.0.3-1 (source amd64) (Vincent Legout)
  • [2012-03-17] gnuchess 6.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2012-03-06] Accepted gnuchess 6.0.2-1 (source amd64) (Vincent Legout)
  • [2009-12-18] gnuchess 5.07-7 MIGRATED to testing (Debian testing watch)
  • [2009-12-07] Accepted gnuchess 5.07-7 (source amd64) (Bradley Smith) (signed by: Bradley John Smith)
  • [2009-10-08] gnuchess 5.07-6 MIGRATED to testing (Debian testing watch)
  • [2009-09-27] Accepted gnuchess 5.07-6 (source amd64) (Bradley Smith) (signed by: Bradley John Smith)
  • [2009-02-16] gnuchess 5.07-5 MIGRATED to testing (Debian testing watch)
  • [2008-10-26] Accepted gnuchess 5.07-5 (source amd64) (Bradley Smith) (signed by: Bradley John Smith)
  • [2008-06-05] gnuchess 5.07-4.1 MIGRATED to testing (Debian testing watch)
  • [2008-05-26] Accepted gnuchess 5.07-4.1 (source i386) (Peter Eisentraut)
  • [2005-12-11] gnuchess 5.07-4 MIGRATED to testing (Debian testing watch)
  • [2005-11-29] Accepted gnuchess 5.07-4 (source powerpc) (Lukas Geyer)
  • [2005-03-04] Accepted gnuchess 5.07-3 (powerpc source) (Lukas Geyer)
  • 1
  • 2
bugs [bug history graph]
  • all: 8 9
  • RC: 0
  • I&N: 7 8
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • l10n (-, 87)
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 6.2.7-1
  • 2 bugs

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing