5.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Unbounded memory allocation in Quill via unvalidated size fields in Mach-O binary parsing
Quill provides simple mac binary signing and notarization from any platform. Quill before version v0.7.1 contains an unbounded memory allocation vulnerability when parsing Mach-O binaries. Exploitation requires that Quill processes an attacker-supplied Mach-O binary, which is most likely in environments such as CI/CD pipelines, shared signing services, or any workflow where externally-submitted binaries are accepted for signing. When parsing a Mach-O binary, Quill reads several size and count fields from the LC_CODE_SIGNATURE load command and embedded code signing structures (SuperBlob, BlobIndex) and uses them to allocate memory buffers without validating that the values are reasonable or consistent with the actual file size. Affected fields include DataSize, DataOffset, and Size from the load command, Count from the SuperBlob header, and Length from individual blob headers. An attacker can craft a minimal (~4KB) malicious Mach-O binary with extremely large values in these fields, causing Quill to attempt to allocate excessive memory. This leads to memory exhaustion and denial of service, potentially crashing the host process. Both the Quill CLI and Go library are affected when used to parse untrusted Mach-O files. This vulnerability is fixed in 0.7.1.
References
- https://github.com/anchore/quill/security/advisories/GHSA-xj69-m9qq-8m94 x_refsource_CONFIRM
Affected products
- ==< 0.7.1
Matching in nixpkgs
pkgs.quill
Minimalistic ledger and governance toolkit for cold wallets on the Internet Computer
pkgs.quill-qr
Print QR codes for use with https://p5deo-6aaaa-aaaab-aaaxq-cai.raw.ic0.app/
pkgs.quill-log
Asynchronous Low Latency C++17 Logging Library
pkgs.typstPackages.quill
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_1_0
A library for creating quantum circuit diagrams
pkgs.typstPackages.quill_0_2_0
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_2_1
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_3_0
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_4_0
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_5_0
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_6_0
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_6_1
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_7_0
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_7_1
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.quill_0_7_2
Effortlessly create quantum circuit diagrams
pkgs.typstPackages.tonguetoquill-usaf-memo
Typeset memos that are fully compliant with AFH 33-337 'The Tongue and Quill
pkgs.typstPackages.tonguetoquill-usaf-memo_0_0_1
Typeset memos that are fully compliant with AFH 33-337 'The Tongue and Quill
pkgs.typstPackages.tonguetoquill-usaf-memo_0_0_2
Typeset memos that are fully compliant with AFH 33-337 'The Tongue and Quill
pkgs.typstPackages.tonguetoquill-usaf-memo_0_1_0
Typeset memos that are fully compliant with AFH 33-337 'The Tongue and Quill
pkgs.typstPackages.tonguetoquill-usaf-memo_0_2_0
Typeset memos that are fully compliant with AFH 33-337 'The Tongue and Quill
pkgs.typstPackages.tonguetoquill-usaf-memo_1_0_0
Typeset memos that are fully compliant with AFH 33-337 'The Tongue and Quill
Package maintainers
-
@colonelpanic8 Ivan Malison <IvanMalison@gmail.com>
-
@odygrd Odysseas Georgoudis <odysseas.georgoudis@gmail.com>
-
@cherrypiejam Gongqi Huang
-
@RossSmyth Ross Smyth