Summary: | <dev-scheme/chicken-4.13.0-r1: buffer overrun in CHICKEN process-execute and process-spawn posix procedures | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ewfalor, maksbotan, proxy-maint, scheme, slawomir.nizio |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/08/14/3 | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 620320, 625392 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2016-08-16 09:25:20 UTC
CVE-2016-6830 and CVE-2016-6831 have been assigned to the aforementioned issues. Like said in comment #1, CVEs were assigned: http://www.openwall.com/lists/oss-security/2016/08/18/2 v4.11.1 is available. From http://code.call-cc.org/dev-snapshots/2016/09/12/NEWS: > 4.11.1 > > - Security fixes > - CVE-2016-6830: Fix buffer overrun due to excessively long argument > or environment lists in process-execute and process-spawn (#1308). > This also removes unnecessary limitations on the length of > these lists (thanks to Vasilij Schneidermann). > - CVE-2016-6831: Fix memory leak in process-execute and > process-spawn. If, during argument and environment list > processing, a list item isn't a string, an exception is thrown, > in which case previously malloc()ed strings weren't freed. > > [...] I've added chicken-4.13, which fixed all CVEs: https://code.call-cc.org/releases/4.13.0/NEWS tree is clean. GLSA Vote: No |