Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 591378 (CVE-2016-6830, CVE-2016-6831)

Summary: <dev-scheme/chicken-4.13.0-r1: buffer overrun in CHICKEN process-execute and process-spawn posix procedures
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: ewfalor, maksbotan, proxy-maint, scheme, slawomir.nizio
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.openwall.com/lists/oss-security/2016/08/14/3
Whiteboard: B3 [noglsa cve]
Package list:
Runtime testing required: ---
Bug Depends on: 620320, 625392    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2016-08-16 09:25:20 UTC
From ${URL} :

I would like to request a CVE for a buffer overrun that
was detected in CHICKEN Scheme's "process-execute" and
"process-spawn" procedures from the posix unit.

CHICKEN preallocated an argument array of ARG_MAX items (or 256 if
that was undefined), and an environment array of ENV_MAX items
(or 1024 if that was undefined), and did not verify that the arguments
or environment lists were less than this size, resulting in a buffer
overrun if these lists were longer.

The full announcement can be found here:
http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html

The bugfix also fixed a memory leak in the same piece of code, which
could potentially be used to cause resource exhaustion/denial of
service situation.  Does this warrant another CVE?

The bug affects all releases of CHICKEN up to and including 4.11.



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 erik falor 2016-08-19 04:37:11 UTC
CVE-2016-6830 and CVE-2016-6831 have been assigned to the aforementioned issues.
Comment 2 Thomas Deutschmann (RETIRED) gentoo-dev 2016-08-21 14:10:08 UTC
Like said in comment #1, CVEs were assigned: http://www.openwall.com/lists/oss-security/2016/08/18/2
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2016-11-18 19:40:43 UTC
v4.11.1 is available. From http://code.call-cc.org/dev-snapshots/2016/09/12/NEWS:

> 4.11.1
> 
> - Security fixes
>   - CVE-2016-6830: Fix buffer overrun due to excessively long argument
>     or environment lists in process-execute and process-spawn (#1308).
>     This also removes unnecessary limitations on the length of
>     these lists (thanks to Vasilij Schneidermann).
>   - CVE-2016-6831: Fix memory leak in process-execute and
>     process-spawn.  If, during argument and environment list
>     processing, a list item isn't a string, an exception is thrown,
>     in which case previously malloc()ed strings weren't freed.
> 
> [...]
Comment 4 Maxim Koltsov (RETIRED) gentoo-dev 2018-03-15 20:39:46 UTC
I've added chicken-4.13, which fixed all CVEs:

https://code.call-cc.org/releases/4.13.0/NEWS
Comment 5 Aaron Bauman (RETIRED) gentoo-dev 2018-06-11 15:08:37 UTC
tree is clean.

GLSA Vote: No