oss-sec mailing list archives
CVE request for select() buffer overrun in CHICKEN Scheme on the Android platform
From: Moritz Heidkamp <moritz.heidkamp () bevuta com>
Date: Wed, 10 Sep 2014 12:47:25 +0200
Hello, I would like to request a CVE for a select() buffer overrun vulnerability in CHICKEN Scheme on the Android platform. This is basically the same issue as CVE-2012-6122 [1], thus the same workaround applies: Set the maximum number of open files ulimit to a value lower than or equal to FD_SETSIZE. Alternatively, apply the patch that fixes the issue (see below). Since the Android platform target was added fairly recently, the only affected release versions are 4.9.0 and 4.9.0.1. The issue is fixed by switching to POSIX poll() on Android, too. This fix will be included in the upcoming release versions 4.9.0.2, 4.9.1, 4.10.0, and 5.0. For the official announcement, see http://lists.nongnu.org/archive/html/chicken-users/2014-08/msg00055.html The patch on the discussion list is http://lists.nongnu.org/archive/html/chicken-hackers/2014-08/msg00017.html and it got applied as http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commit;h=bbf5c1d5839970c17b37406155180853c325c710 A patch which changes the default to be POSIX poll() so that platforms added in the future will be more likely not to be affected by this issue is being discussed at http://lists.nongnu.org/archive/html/chicken-hackers/2014-08/msg00019.html Regards Moritz [1] Original announcement: http://lists.nongnu.org/archive/html/chicken-users/2012-06/msg00031.html
Current thread:
- CVE request for select() buffer overrun in CHICKEN Scheme on the Android platform Moritz Heidkamp (Sep 10)