[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.5] guile: multiple issues (CVE-2016-8605, CVE-2016-8606)

ID: oval:org.secpod.oval:def:1800805Date: (C)2018-03-28   (M)2024-01-03
Class: PATCHFamily: unix




CVE-2016-8605: Thread-unsafe umask modification The mkdir procedure of GNU Guile, an implementation of the Scheme programming language, temporarily changed the process" umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. Fixed In Version guile 2.0.13 Reference Patch CVE-2016-8606: REPL server vulnerable to HTTP inter-protocol attacks The REPL server is vulnerable to the HTTP inter-protocol attack This constitutes a remote code execution vulnerability for developers running a REPL server that listens on a loopback device or private network. Applications that do not run a REPL server, as is usually the case, are unaffected. Fixed In Version guile 2.0.13 Reference Patch

Platform:
Alpine Linux 3.5
Product:
guile
Reference:
6364
CVE-2016-8605
CVE-2016-8606
CVE    2
CVE-2016-8605
CVE-2016-8606
CPE    2
cpe:/o:alpinelinux:alpine_linux:3.5
cpe:/a:gnu:guile

© SecPod Technologies