Description
Quill provides simple mac binary signing and notarization from any platform. Quill before version v0.7.1 contains an unbounded memory allocation vulnerability when parsing Mach-O binaries. Exploitation requires that Quill processes an attacker-supplied Mach-O binary, which is most likely in environments such as CI/CD pipelines, shared signing services, or any workflow where externally-submitted binaries are accepted for signing. When parsing a Mach-O binary, Quill reads several size and count fields from the LC_CODE_SIGNATURE load command and embedded code signing structures (SuperBlob, BlobIndex) and uses them to allocate memory buffers without validating that the values are reasonable or consistent with the actual file size. Affected fields include DataSize, DataOffset, and Size from the load command, Count from the SuperBlob header, and Length from individual blob headers. An attacker can craft a minimal (~4KB) malicious Mach-O binary with extremely large values in these fields, causing Quill to attempt to allocate excessive memory. This leads to memory exhaustion and denial of service, potentially crashing the host process. Both the Quill CLI and Go library are affected when used to parse untrusted Mach-O files. This vulnerability is fixed in 0.7.1.
Published: 2026-03-11
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (memory exhaustion)
Action: Immediate Patch
AI Analysis

Impact

Quill, a macOS binary signing utility developed by anchore, contains an unbounded memory allocation flaw (CWE-770) when parsing Mach‑O binaries before version 0.7.1. The vulnerability stems from Quill reading size and count fields—such as DataSize, DataOffset, Size, Count, and Length—from the LC_CODE_SIGNATURE load command and embedded signing structures without validating them against the actual file size. An attacker can craft a minimal (~4 KB) Mach‑O file with exaggerated values for these fields, causing Quill to attempt to allocate excessive amounts of memory. This results in memory exhaustion and can bring the Quill process to a halt, effectively denying service to any signing workflow that relies on the tool.

Affected Systems

The affected product is Quill from anchore. All releases prior to v0.7.1, including both the command‑line interface and the Go library, are vulnerable. Any environment that allows Quill to parse externally supplied Mach‑O binaries—such as CI/CD pipelines, shared signing services, or other automated build workflows—is at risk.

Risk and Exploitability

The CVSS base score of 5.5 indicates medium severity. The EPSS score is below 1%, suggesting a low probability of widespread exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires that the attacker supplies a specially crafted Mach‑O file to a vulnerable instance of Quill; this is feasible in contexts where binaries are uploaded for signing. The effect is restricted to denial of service through memory exhaustion; there is no evidence of arbitrary code execution or privilege escalation.

Generated by OpenCVE AI on March 17, 2026 at 16:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Quill to version 0.7.1 or later; the patch removes the unbounded allocation logic.
  • If an immediate upgrade is not possible, restrict Quill to only process trusted binaries or apply strict input validation before passing files to Quill.
  • Run Quill in a sandboxed or containerized environment with enforced memory limits to contain potential exhaustion impact.
  • Monitor for out‑of‑memory or crash events in the CI/CD pipeline and enable automatic recovery or alerting.

Generated by OpenCVE AI on March 17, 2026 at 16:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xj69-m9qq-8m94 Quill has unbounded memory allocation via unvalidated size fields in Mach-O binary parsing
History

Mon, 16 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:anchore:quill:*:*:*:*:*:*:*:*

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Anchore
Anchore quill
Vendors & Products Anchore
Anchore quill

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Quill provides simple mac binary signing and notarization from any platform. Quill before version v0.7.1 contains an unbounded memory allocation vulnerability when parsing Mach-O binaries. Exploitation requires that Quill processes an attacker-supplied Mach-O binary, which is most likely in environments such as CI/CD pipelines, shared signing services, or any workflow where externally-submitted binaries are accepted for signing. When parsing a Mach-O binary, Quill reads several size and count fields from the LC_CODE_SIGNATURE load command and embedded code signing structures (SuperBlob, BlobIndex) and uses them to allocate memory buffers without validating that the values are reasonable or consistent with the actual file size. Affected fields include DataSize, DataOffset, and Size from the load command, Count from the SuperBlob header, and Length from individual blob headers. An attacker can craft a minimal (~4KB) malicious Mach-O binary with extremely large values in these fields, causing Quill to attempt to allocate excessive memory. This leads to memory exhaustion and denial of service, potentially crashing the host process. Both the Quill CLI and Go library are affected when used to parse untrusted Mach-O files. This vulnerability is fixed in 0.7.1.
Title Unbounded memory allocation in Quill via unvalidated size fields in Mach-O binary parsing
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T19:58:31.965Z

Reserved: 2026-03-10T15:40:10.483Z

Link: CVE-2026-31961

cve-icon Vulnrichment

Updated: 2026-03-11T19:58:23.101Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T20:16:17.103

Modified: 2026-03-16T19:06:39.333

Link: CVE-2026-31961

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:29:13Z

Weaknesses