Your message dated Fri, 21 Oct 2016 19:23:35 +0200
with message-id <[email protected]>
and subject line Re: Bug#841495: guile: REPL server vulnerable to HTTP 
inter-protocol attacks
has caused the Debian Bug report #841495,
regarding guile: REPL server vulnerable to HTTP inter-protocol attacks
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
841495: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841495
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: guile-1.8
Severity: normal
Tags: security

GNU Guile, an implementation of the Scheme language, provides a "REPL server" 
which is a command prompt that developers can connect to for live coding and 
debugging purposes. The REPL server is started by the '--listen' command-line 
option or equivalent API.

It was  reported that the REPL server is vulnerable to the HTTP inter-protocol 
attack

This constitutes a remote code execution vulnerability for developers running a 
REPL server that listens on a loopback device or private network. Applications 
that do not run a REPL server, as is usually the case, are unaffected.

References:

http://seclists.org/oss-sec/2016/q4/100

Upstream patch:

http://git.savannah.gnu.org/cgit/guile.git/commit/?h=stable-2.0&id=08c021916dbd3a235a9f9cc33df4c418c0724e03

--- End Message ---
--- Begin Message ---
On Fri, Oct 21, 2016 at 10:57:59AM +0300, Matanya Moses wrote:
> Package: guile-1.8
> Severity: normal
> Tags: security
> 
> GNU Guile, an implementation of the Scheme language, provides a
> "REPL server" which is a command prompt that developers can connect
> to for live coding and debugging purposes. The REPL server is
> started by the '--listen' command-line option or equivalent API.
> 
> It was  reported that the REPL server is vulnerable to the HTTP
> inter-protocol attack
> 
> This constitutes a remote code execution vulnerability for
> developers running a REPL server that listens on a loopback device
> or private network. Applications that do not run a REPL server, as
> is usually the case, are unaffected.

The REPL server was only introduced in the 2.0 series. The
CVE-2016-8606 is tracked already with #840555 for guile-2.0.

Regards,
Salvatore

--- End Message ---

Reply via email to