|
|
Subscribe / Log in / New account

guile: two vulnerabilities

Package(s):guile CVE #(s):CVE-2016-8605 CVE-2016-8606
Created:October 17, 2016 Updated:February 17, 2017
Description: From the Arch Linux advisory:

- CVE-2016-8605 (information disclosure): The mkdir procedure of GNU Guile, an implementation of the Scheme programming language, temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777.

- CVE-2016-8606 (arbitrary code execution): It was reported that the REPL server is vulnerable to the HTTP inter- protocol attack. This constitutes a remote code execution vulnerability for developers running a REPL server that listens on a loopback device or private network. Applications that do not run a REPL server, as is usually the case, are unaffected.

A remote attacker is able to execute arbitrary code via a HTTP inter-protocol attack if the REPL server is listening on a loopback device or private network.

Running a multi-threaded guile application can cause directories or files to be created with world readable/writable/executable permissions during a small window which leads to information disclosure.

Alerts:
openSUSE openSUSE-SU-2016:2643-1 guile1 2016-10-26
openSUSE openSUSE-SU-2016:2647-1 guile1 2016-10-26
openSUSE openSUSE-SU-2016:2645-1 guile 2016-10-26
Mageia MGASA-2016-0354 guile 2016-10-23
Fedora FEDORA-2016-a47bf58beb guile 2016-10-22
Fedora FEDORA-2016-34209c3a8e guile 2016-10-18
Debian-LTS DLA-666-1 guile-2.0 2016-10-19
Arch Linux ASA-201610-10 guile 2016-10-16
openSUSE openSUSE-SU-2017:0482-1 guile 2017-02-17
Fedora FEDORA-2016-990e2012ea compat-guile18 2017-01-12
Fedora FEDORA-2016-6dd3bc37c3 compat-guile18 2017-01-12

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds