Bugzilla – Bug 1004221
VUL-1: CVE-2016-8605: guile, guile1: Thread-unsafe umask modification
Last modified: 2020-06-18 13:36:26 UTC
CVE-2016-8605 From: (Ludovic Courtès) The ‘mkdir’ procedure of GNU Guile, an implementation of the Scheme programming language, temporarily changed the process’ umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, ‘mkdir’ without the optional ‘mode’ argument would create directories as 0777. This can be worked around by always passing the optional ‘mode’ argument to Guile’s ‘mkdir’ procedure. This will be fixed in Guile 2.0.13, to be released shortly. Upstream bug report: http://bugs.gnu.org/24659 Patch: http://git.savannah.gnu.org/cgit/guile.git/commit/?h=stable-2.0&id=245608911698adb3472803856019bdd5670b6614 References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8605 http://seclists.org/oss-sec/2016/q4/101
bugbot adjusting priority
Submit request against devel project created: 435742.
guile1 devel project submit request: 435751
This is an autogenerated message for OBS integration: This bug (1004221) was mentioned in https://build.opensuse.org/request/show/435737 13.2 / guile
Created request sr#435778 to Leap:42.2
(In reply to Dave Plater from comment #8) > Created request sr#435778 to Leap:42.2 Sigh, it was not so good idea to fork it from SLE12 code base just because spec cleaner call :/. Leap:42.1 is needed too then.
(In reply to Petr Gajdos from comment #9) > Sigh, it was not so good idea to fork it from SLE12 code base just because > spec cleaner call :/. > > Leap:42.1 is needed too then. Done.
This is an autogenerated message for OBS integration: This bug (1004221) was mentioned in https://build.opensuse.org/request/show/435756 13.2 / guile1 https://build.opensuse.org/request/show/435793 42.1 / guile1
Worse, factory auto declined the request. I think you needed to use "added patch" instead of +. I once put a , in the changes reference to the patch instead of a . and it was declined.
You forgot the 1 in guile1
Thanks for correction. Fixed in 13.2, 42.1 and 12 submission.
This is an autogenerated message for OBS integration: This bug (1004221) was mentioned in https://build.opensuse.org/request/show/435801 13.2 / guile1 https://build.opensuse.org/request/show/435802 42.1 / guile1
I believe all fixed.
openSUSE-SU-2016:2643-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 1004221 CVE References: CVE-2016-8605 Sources used: openSUSE 13.2 (src): guile1-1.8.8-16.3.1
openSUSE-SU-2016:2645-1: An update that fixes two vulnerabilities is now available. Category: security (low) Bug References: 1004221,1004226 CVE References: CVE-2016-8605,CVE-2016-8606 Sources used: openSUSE 13.2 (src): guile-2.0.11-3.3.1
openSUSE-SU-2016:2647-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 1004221 CVE References: CVE-2016-8605 Sources used: openSUSE Leap 42.1 (src): guile1-1.8.8-22.1
An update workflow for this issue was started. This issue was rated as low. Please submit fixed packages until 2016-12-19. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63204
SUSE-SU-2017:0394-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 1004221 CVE References: CVE-2016-8605 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): guile-1.8.5-24.1 SUSE Linux Enterprise Server 11-SP4 (src): guile-1.8.5-24.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): guile-1.8.5-24.1
SUSE-SU-2017:0398-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 1004221 CVE References: CVE-2016-8605 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP2 (src): guile-2.0.9-8.3 SUSE Linux Enterprise Software Development Kit 12-SP1 (src): guile-2.0.9-8.3 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): guile-2.0.9-8.3 SUSE Linux Enterprise Server 12-SP2 (src): guile-2.0.9-8.3 SUSE Linux Enterprise Server 12-SP1 (src): guile-2.0.9-8.3 SUSE Linux Enterprise Desktop 12-SP2 (src): guile-2.0.9-8.3 SUSE Linux Enterprise Desktop 12-SP1 (src): guile-2.0.9-8.3
openSUSE-SU-2017:0482-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 1004221 CVE References: CVE-2016-8605 Sources used: openSUSE Leap 42.2 (src): guile-2.0.9-8.1 openSUSE Leap 42.1 (src): guile-2.0.9-7.1
fixed
SUSE-SU-2020:1659-1: An update that fixes one vulnerability is now available. Category: security (low) Bug References: 1004221 CVE References: CVE-2016-8605 Sources used: SUSE Linux Enterprise Workstation Extension 12-SP5 (src): guile1-1.8.8-16.4.39 SUSE Linux Enterprise Workstation Extension 12-SP4 (src): guile1-1.8.8-16.4.39 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): guile1-1.8.8-16.4.39 SUSE Linux Enterprise Software Development Kit 12-SP4 (src): guile1-1.8.8-16.4.39 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.