security
security copied to clipboard
Roundup: [oss-security] CVE request for unchecked size argument in malloc() in CHICKEN Scheme
Here is a report from the oss-security mailing list for Vulnerability Roundup 27.
Skip to First Email
Instructions:
Identification
Identify if we have the software, in 16.09, 17.03, and unstable. Then determine if we are vulnerable, and make a comment with your findings. It can also be helpful to specify if you think there is a patch, or if it can be fixed via a general update.
Example:
unstable: we are not vulnerable (link to the package)
17.03: we are vulnerable (link to the package)
16.09: we don't have it packaged
IMPORTANT: If you believe there are possibly related issues, bring them up on the parent issue!
Patching
Start by commenting on this issue saying you're working on a patch. This way, we don't duplicate work.
If you open a pull request, tag this issue and the master issue for the roundup.
If you commit the patch directly to a branch, please leave a comment on this issue with the branch and the commit hash, example:
fixed:
release-16.09: abc123
Skip to First Email
Upon Completion ...
- [ ] Update Graham's database
Info
Triage Indicator:
-needs-triage +roundup27 thread:00000000000041d5
- File Search: https://search.nix.gsc.io/?q=chicken&i=fosho&repos=nixos-nixpkgs
- GitHub Search: https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=chicken+in%3Apath&type=Code
Should the search term be changed from chicken
? Suggest a new package search by commenting:
-suggested:chicken +suggested:correctPackageName thread:00000000000041d5
Known CVEs: CVE-2017-6949
Skip to End
Wed, 15 Mar 2017 23:47:49 +0100 Peter Bex <peter-at-more-magic.net>, [email protected]
Hello all,
I'd like to request a CVE for an unchecked malloc() argument in
CHICKEN Scheme's SRFI-4 vector constructors, when allocating the
vector in unmanaged memory. Due to the missing range check, this
could result in negative or too small size allocations, which would
result in a crash or a buffer overrun, depending on the size.
This issue affects all current releases of CHICKEN Scheme, including
the latest release, 4.12.0.
The official announcement was made here:
http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.html
Cheers,
Peter Bex
signature.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJYycSVAAoJEBEdufnLRYmwdcYH/RSZnyoOEv8jjhdFi0hy5udT
zV2Sn08UbKdIbJDZeTFU5r22DJUo69KS23VO/uRG5RQuJXOU/S2TnEFWQFEHD879
C68MPpGhzDgB0I0UBZy/dCbl4PydZBDGfHa8KFeTM/EaMRjUuHTrXk5OBmMspB/U
Is7xqpr7c8WJBpxEG9l5fGWnEcNZHodemt9cAdGTuTjLGY+3J9zxe1Dhxt9tuJQy
bKpzK1Smysp90RyJ46GhItir+cf4Whc4YqBfSHJVucf5ZRvTPFjNuIdKYy9q7LlV
7xD+dXQDFiEC2bD9nDBF1/lA7J3+eQvqKBnn/ltIxpQw9jpI5e5n7WDcrfsu80c=
=U8I3
-----END PGP SIGNATURE-----
Skip to End
Wed, 15 Mar 2017 17:03:18 -0600 "Don A. Bailey" <donb-at-securitymouse.com>, [email protected]
I find this extremely amusing.
https://www.securitymouse.com/lms-2014-06-23-7
D
> On Mar 15, 2017, at 4:47 PM, Peter Bex <[email protected]> wrote:
>
> Hello all,
>
> I'd like to request a CVE for an unchecked malloc() argument in
> CHICKEN Scheme's SRFI-4 vector constructors, when allocating the
> vector in unmanaged memory. Due to the missing range check, this
> could result in negative or too small size allocations, which would
> result in a crash or a buffer overrun, depending on the size.
>
> This issue affects all current releases of CHICKEN Scheme, including
> the latest release, 4.12.0.
>
> The official announcement was made here:
> http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.html
>
> Cheers,
> Peter Bex
Skip to End
Thu, 16 Mar 2017 10:31:17 +0100 Adam Maris <amaris-at-redhat.com>, [email protected]
On Wed, 2017-03-15 at 23:47 +0100, Peter Bex wrote:
> Hello all,
>
> I'd like to request a CVE for an unchecked malloc() argument in
> CHICKEN Scheme's SRFI-4 vector constructors, when allocating the
> vector in unmanaged memory. Due to the missing range check, this
> could result in negative or too small size allocations, which would
> result in a crash or a buffer overrun, depending on the size.
>
> This issue affects all current releases of CHICKEN Scheme, including
> the latest release, 4.12.0.
>
> The official announcement was made here:
> http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.h
> tml
>
>
Hi Peter,
oss-security mailing is no longer a place for requesting CVEs. Please,
request CVE from MITRE via https://cveform.mitre.org/ or also possibly
from DWF project via http://iwantacve.org/
Thanks!
Best Regards,
--
Adam Mariš, Red Hat Product Security
1CCD 3446 0529 81E3 86AF 2D4C 4869 76E7 BEF0 6BC2
signature.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=JZ7H
-----END PGP SIGNATURE-----
Skip to End
Thu, 16 Mar 2017 11:08:21 +0100 Peter Bex <peter-at-more-magic.net>, [email protected]
On Thu, Mar 16, 2017 at 10:31:17AM +0100, Adam Maris wrote:
> Hi Peter,
>
> oss-security mailing is no longer a place for requesting CVEs. Please,
> request CVE from MITRE via https://cveform.mitre.org/ or also possibly
> from DWF project via http://iwantacve.org/
Oh yeah, I forgot about that. I've filled out the form, and I hope I've
done this correctly.
Cheers,
Peter
signature.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJYymQVAAoJEBEdufnLRYmwMwMH/3Y10qS8/SILb4BvlVe5TobR
pnudR6Ihn2JplriNChzuw5rYg7IgEX++eRd2SRe9JpiBDa6hUiSa7rcaIxwWVJhq
s/c8r17eSpgaoaQroIL36IKMLN9a9RDafZzVQbaWd2qWUaRezoTouBlUtowrl89s
jwYCIkgrY9e5rgKPesxaZMbzwclW5HE6bWhsUwaXO23na2Fq7uL9Pc4mVi8dmI6E
OTwWqll5c62n2Z/B3iICtoJnViPQ5RvgtcyWW/nZ87/zsNGClc014681hTvkyRHF
J04iQl1szzNkYvMkAvoAxOjotMKywij1ygH+ex5dNogcHGrF+pZjon3OVIR8lWM=
=TPo8
-----END PGP SIGNATURE-----
Skip to End
Thu, 16 Mar 2017 13:17:13 +0100 Peter Korsgaard <peter-at-korsgaard.com>, [email protected]
>>>>> "Peter" == Peter Bex <[email protected]> writes:
> On Thu, Mar 16, 2017 at 10:31:17AM +0100, Adam Maris wrote:
>> Hi Peter,
>>
>> oss-security mailing is no longer a place for requesting CVEs. Please,
>> request CVE from MITRE via https://cveform.mitre.org/ or also possibly
>> from DWF project via http://iwantacve.org/
> Oh yeah, I forgot about that. I've filled out the form, and I hope I've
> done this correctly.
Please don't forget to forward the form details to this list once a CVE
has been assigned. Thanks.
--
Bye, Peter Korsgaard
Skip to End
Thu, 16 Mar 2017 17:34:21 +0100 Peter Bex <peter-at-more-magic.net>, [email protected]
On Thu, Mar 16, 2017 at 01:17:13PM +0100, Peter Korsgaard wrote:
> >>>>> "Peter" == Peter Bex <[email protected]> writes:
>
> > On Thu, Mar 16, 2017 at 10:31:17AM +0100, Adam Maris wrote:
> >> Hi Peter,
> >>
> >> oss-security mailing is no longer a place for requesting CVEs. Please,
> >> request CVE from MITRE via https://cveform.mitre.org/ or also possibly
> >> from DWF project via http://iwantacve.org/
>
> > Oh yeah, I forgot about that. I've filled out the form, and I hope I've
> > done this correctly.
>
> Please don't forget to forward the form details to this list once a CVE
> has been assigned. Thanks.
This was assigned CVE-2017-6949. The form details were in my original
mail, but I'll include them here again, though I must say fiddling around
with e-mail to forward it is much much more inconvenient than how it used
to work:
> [Suggested description]
> An issue was discovered in CHICKEN Scheme through 4.12.0.
> When using a nonstandard CHICKEN-specific extension to allocate an
> SRFI-4 vector in unmanaged memory, the vector size would be used in
> unsanitised form as an argument to malloc(). With an unexpected size,
> the impact may have been a segfault or buffer overflow.
>
> ------------------------------------------
>
> [Vulnerability Type]
> Buffer Overflow
>
> ------------------------------------------
>
> [Affected Product Code Base]
> Affected: All versions up to and including 4.12.0. No fixed versions released yet
>
> ------------------------------------------
>
> [Affected Component]
> All SRFI-4 vector constructor functions in CHICKEN Scheme
>
> ------------------------------------------
>
> [Attack Type]
> Context-dependent
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> [Impact Denial of Service]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> When using a nonstandard CHICKEN-specific extension to allocate a
> SRFI-4 vector in unmanaged memory, the vector size would be used in
> unsanitised form as argument to malloc().
>
> ------------------------------------------
>
> [Reference]
> http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.html
>
> ------------------------------------------
>
> [Has vendor confirmed or acknowledged the vulnerability?]
> true
>
> ------------------------------------------
>
> [Discoverer]
> Lemonboy
signature.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJYyr6NAAoJEBEdufnLRYmwBW4H/3j/hV2xR+8g6lmKF9iyixOV
KuJVi89in7J90oM4KxZMRf5sPnPuvtUhno06wylnF6aqZbN4cVw46NzITkaBrlKl
VUGxIsYr3mRcOlG+6WDVo/IdK8CQP8e9tSZ9mQBlivKiPJjZSyz4OWUeiHt09kIp
BnWDMrO/2QlunSzTMjYipI6mJl4nw/Rv3OaTvRMSgaoTWk0Uway8TmWgbm+FmPo2
j+94tJGPgotN9qDhAD9cX4pQz0BB3hJKUUwupEA54e8tg3k6YMGX/KHlrPkVfKKH
bGLeWsr7ha/5ttmsOvkFVBdFtES24nqI6e1GRCAuKWOwom9CxONjV+fLzlA6j1g=
=gRq8
-----END PGP SIGNATURE-----
Skip to End
Thu, 16 Mar 2017 22:15:11 +0100 Peter Korsgaard <peter-at-korsgaard.com>, [email protected]
>>>>> "Peter" == Peter Bex <[email protected]> writes:
> On Thu, Mar 16, 2017 at 01:17:13PM +0100, Peter Korsgaard wrote:
>> >>>>> "Peter" == Peter Bex <[email protected]> writes:
>>
>> > On Thu, Mar 16, 2017 at 10:31:17AM +0100, Adam Maris wrote:
>> >> Hi Peter,
>> >>
>> >> oss-security mailing is no longer a place for requesting CVEs. Please,
>> >> request CVE from MITRE via https://cveform.mitre.org/ or also possibly
>> >> from DWF project via http://iwantacve.org/
>>
>> > Oh yeah, I forgot about that. I've filled out the form, and I hope I've
>> > done this correctly.
>>
>> Please don't forget to forward the form details to this list once a CVE
>> has been assigned. Thanks.
> This was assigned CVE-2017-6949. The form details were in my original
> mail, but I'll include them here again, though I must say fiddling around
> with e-mail to forward it is much much more inconvenient than how it used
> to work:
Thanks, and yes - I agree. The longer term plan is afaik that this
should happen automatically by the MITRE system.
--
Bye, Peter Korsgaard
Skip to End