#8436: guile-2.0.13 (CVE-2016-8605 CVE-2016-8606) -----------------------------+----------------------- Reporter: pierre.labastie | Owner: bdubbs@… Type: enhancement | Status: closed Priority: normal | Milestone: 7.11 Component: BOOK | Version: SVN Severity: normal | Resolution: fixed Keywords: | -----------------------------+-----------------------
Old description: > New point version New description: New point version {{{ Description =========== - CVE-2016-8605 (information disclosure) The mkdir procedure of GNU Guile, an implementation of the Scheme programming language, temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. - CVE-2016-8606 (arbitrary code execution) It was reported that the REPL server is vulnerable to the HTTP inter- protocol attack. This constitutes a remote code execution vulnerability for developers running a REPL server that listens on a loopback device or private network. Applications that do not run a REPL server, as is usually the case, are unaffected. Impact ====== A remote attacker is able to execute arbitrary code via a HTTP inter-protocol attack if the REPL server is listening on a loopback device or private network. Running a multi-threaded guile application can cause directories or files to be created with world readable/writable/executable permissions during a small window which leads to information disclosure. }}} [http://www.openwall.com/lists/oss-security/2016/10/11/1] [http://www.openwall.com/lists/oss-security/2016/10/12/2] -- Comment (by renodr): Bruce, just updating the description with the list of security fixes and marking as high. Missed these while I was away from both of my email accounts. -- Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/8436#comment:3> BLFS Trac <http://wiki.linuxfromscratch.org/blfs> Beyond Linux From Scratch -- http://lists.linuxfromscratch.org/listinfo/blfs-book FAQ: http://www.linuxfromscratch.org/blfs/faq.html Unsubscribe: See the above information page