Changes between Initial Version and Version 3 of Ticket #8436


Ignore:
Timestamp:
10/17/2016 03:51:07 PM (8 years ago)
Author:
Douglas R. Reno
Comment:

Bruce, just updating the description with the list of security fixes and marking as high. Missed these while I was away from both of my email accounts.

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #8436

    • Property Owner changed from blfs-book@… to bdubbs@…
    • Property Status newclosed
    • Property Resolutionfixed
    • Property Summary guile-2.0.13guile-2.0.13 (CVE-2016-8605 CVE-2016-8606)
  • Ticket #8436 – Description

    initial v3  
    11New point version
     2
     3
     4{{{
     5Description
     6===========
     7
     8- CVE-2016-8605 (information disclosure)
     9
     10The mkdir procedure of GNU Guile, an implementation of the
     11Scheme programming language, temporarily changed the
     12process' umask to zero.  During that time window, in a
     13multithreaded application, other threads could end up
     14creating files with insecure permissions. For example, mkdir
     15without the optional mode argument would create directories
     16as 0777.
     17
     18- CVE-2016-8606 (arbitrary code execution)
     19
     20It was  reported that the REPL server is vulnerable to the
     21HTTP inter- protocol attack. This constitutes a remote code
     22execution vulnerability for developers running a REPL server
     23that listens on a loopback device or private network.
     24Applications that do not run a REPL server, as is usually
     25the case, are unaffected.
     26
     27Impact
     28======
     29
     30A remote attacker is able to execute arbitrary code via a HTTP
     31inter-protocol attack if the REPL server is listening on a
     32loopback device or private network.
     33
     34Running a multi-threaded guile application can cause
     35directories or files to be created with world
     36readable/writable/executable permissions during a small window
     37which leads to information disclosure.
     38}}}
     39
     40[http://www.openwall.com/lists/oss-security/2016/10/11/1]
     41
     42[http://www.openwall.com/lists/oss-security/2016/10/12/2]