From ${URL} : I would like to request a CVE for a buffer overrun that was detected in CHICKEN Scheme's "process-execute" and "process-spawn" procedures from the posix unit. CHICKEN preallocated an argument array of ARG_MAX items (or 256 if that was undefined), and an environment array of ENV_MAX items (or 1024 if that was undefined), and did not verify that the arguments or environment lists were less than this size, resulting in a buffer overrun if these lists were longer. The full announcement can be found here: http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html The bugfix also fixed a memory leak in the same piece of code, which could potentially be used to cause resource exhaustion/denial of service situation. Does this warrant another CVE? The bug affects all releases of CHICKEN up to and including 4.11. @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2016-6830 and CVE-2016-6831 have been assigned to the aforementioned issues.
Like said in comment #1, CVEs were assigned: http://www.openwall.com/lists/oss-security/2016/08/18/2
v4.11.1 is available. From http://code.call-cc.org/dev-snapshots/2016/09/12/NEWS: > 4.11.1 > > - Security fixes > - CVE-2016-6830: Fix buffer overrun due to excessively long argument > or environment lists in process-execute and process-spawn (#1308). > This also removes unnecessary limitations on the length of > these lists (thanks to Vasilij Schneidermann). > - CVE-2016-6831: Fix memory leak in process-execute and > process-spawn. If, during argument and environment list > processing, a list item isn't a string, an exception is thrown, > in which case previously malloc()ed strings weren't freed. > > [...]
I've added chicken-4.13, which fixed all CVEs: https://code.call-cc.org/releases/4.13.0/NEWS
tree is clean. GLSA Vote: No