Date: Mon, 29 Apr 2013 13:33:12 -0600 From: Kurt Seifried <kseifried@...hat.com> To: Open Source Security <oss-security@...ts.openwall.com> Subject: Re: OS command injection vulnerability in Chicken Scheme -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 04/21/2013 01:11 PM, Peter Bex wrote: > Hello, > > I'd like to request a CVE identifier for a bug in Chicken Scheme > which allows a malicious user to cause shell command execution > through injection of a pipe symbol and possibly other shell meta > characters. > > This bug is present in all versions of CHICKEN. It will be fixed > in 4.8.3 and 4.8.2 as per commit > 58684f69572453acc6fed7326fa9df39be98760e. Version 4.9.0 will likely > be the first stable release to include this fix, unless it is > decided to backport this fix to the stability release. > > The full announcement is here: > http://lists.nongnu.org/archive/html/chicken-announce/2013-04/msg00000.html Please > use CVE-2013-2024 for this issue. > By the way, I'm confused as to why the CVEs I've requested so far > don't show up in NVD. For example, > http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6122 says > the CVE does not exist, but Kurt assigned it in February: > http://www.openwall.com/lists/oss-security/2013/02/08/2 > > The other CVE numbers in that mail produce a "not found" page as > well and an NVD database search for "chicken" turns up nothing > related to Chicken Scheme. The page says the database was last > updated April 19th 2013, so that's not the cause either. Because Mitre has a large backlog of CVE's to research and write up. Submitting researched/written entries to them will probably result in your entries being posted faster. Try to remember that CVE pushed thousands of these a year, the volume is considerable. > Cheers, Peter Bex Apologies for the late reply - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRfsr4AAoJEBYNRVNeJnmTUeQP/jyLkpkuLZZ/fgYUOj13X4UG TxnD3Yt8szD7xca/g/0f8SEFRH5+MinlUzYBjB/WS8ZZH2jMR2mJef/GJso48UXZ MKq9bEfBtyHL92RZwjIlzZyTMEK9l7/7nQX5psfr10NkA4UrHF9OXmyI4xrqi6+p CspfDaHlct8LkMjnQGCeXlT49onbsn2Ujq3vOCrHi0EcRArFHbSyplwnKC/zNj90 /jPjuv/A6S5bpebv2ygFMGVGzNIOMoJn/R0wFMvDpztrCl87jJiErMaYVzyZA9KA PEvR+sbB5niIRjEHSW0Vp42ZTUbnryZXNsR7LHOKO7J+qupx76eYuW4kuslnYNx2 GukDDLmI9/3wkcYqUmAX40srYzn3p8QE4hRjnLAl4fti0VMLTiBrYebF0VLk5H3A 4EobmqUK4EtfeFheQuVX+515wDmGbAd1RXZQ0uMGmwNvGDE8lTRkPItPcGa55EMz PVDSt8fX4BeXZIXGi+NZ4Ul3UhNRfJLXNEa27DUvFeg89uwOT2Pgz5MNjtTgUAD+ 21XlfWp41+ChPikw+mfTPnXoHNwL47bPfqHTKlhI7KRhnkQTLUiqP7U7N+CNvfaJ P9sCOgTqTrqlBiOBJ72pOVfq0Cd0ZGGWmWaN12BkzA+qQces6vZrpxpO+HZsCpwq jJAcO+jUToZh+7u0UcpS =1CAw -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.