Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 29 Apr 2013 13:33:12 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: Re: OS command injection vulnerability in Chicken
 Scheme

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 04/21/2013 01:11 PM, Peter Bex wrote:
> Hello,
> 
> I'd like to request a CVE identifier for a bug in Chicken Scheme
> which allows a malicious user to cause shell command execution
> through injection of a pipe symbol and possibly other shell meta
> characters.
> 
> This bug is present in all versions of CHICKEN.  It will be fixed 
> in 4.8.3 and 4.8.2 as per commit
> 58684f69572453acc6fed7326fa9df39be98760e. Version 4.9.0 will likely
> be the first stable release to include this fix, unless it is
> decided to backport this fix to the stability release.
> 
> The full announcement is here: 
> http://lists.nongnu.org/archive/html/chicken-announce/2013-04/msg00000.html

Please
> 
use CVE-2013-2024 for this issue.

> By the way, I'm confused as to why the CVEs I've requested so far
> don't show up in NVD.  For example, 
> http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-6122 says
> the CVE does not exist, but Kurt assigned it in February: 
> http://www.openwall.com/lists/oss-security/2013/02/08/2
> 
> The other CVE numbers in that mail produce a "not found" page as
> well and an NVD database search for "chicken" turns up nothing
> related to Chicken Scheme.  The page says the database was last
> updated April 19th 2013, so that's not the cause either.

Because Mitre has a large backlog of CVE's to research and write up.
Submitting researched/written entries to them will probably result in
your entries being posted faster. Try to remember that CVE pushed
thousands of these a year, the volume is considerable.

> Cheers, Peter Bex

Apologies for the late reply




- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=1CAw
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.