CHICKEN Scheme on the Android platform select() buffer overrun

2014.09.10
Credit: Moritz
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Hello, I would like to request a CVE for a select() buffer overrun vulnerability in CHICKEN Scheme on the Android platform. This is basically the same issue as CVE-2012-6122 [1], thus the same workaround applies: Set the maximum number of open files ulimit to a value lower than or equal to FD_SETSIZE. Alternatively, apply the patch that fixes the issue (see below). Since the Android platform target was added fairly recently, the only affected release versions are 4.9.0 and 4.9.0.1. The issue is fixed by switching to POSIX poll() on Android, too. This fix will be included in the upcoming release versions 4.9.0.2, 4.9.1, 4.10.0, and 5.0. For the official announcement, see http://lists.nongnu.org/archive/html/chicken-users/2014-08/msg00055.html The patch on the discussion list is http://lists.nongnu.org/archive/html/chicken-hackers/2014-08/msg00017.html and it got applied as http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commit;h=bbf5c1d5839970c17b37406155180853c325c710 A patch which changes the default to be POSIX poll() so that platforms added in the future will be more likely not to be affected by this issue is being discussed at http://lists.nongnu.org/archive/html/chicken-hackers/2014-08/msg00019.html Regards Moritz [1] Original announcement: http://lists.nongnu.org/archive/html/chicken-users/2012-06/msg00031.html

References:

http://lists.nongnu.org/archive/html/chicken-users/2014-08/msg00055.html
http://lists.nongnu.org/archive/html/chicken-hackers/2014-08/msg00017.html
http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commit;h=bbf5c1d5839970c17b37406155180853c325c710


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top