Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 591378 (CVE-2016-6830, CVE-2016-6831) - <dev-scheme/chicken-4.13.0-r1: buffer overrun in CHICKEN process-execute and process-spawn posix procedures
Summary: <dev-scheme/chicken-4.13.0-r1: buffer overrun in CHICKEN process-execute and ...
Status: RESOLVED FIXED
Alias: CVE-2016-6830, CVE-2016-6831
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on: CVE-2017-9334 CVE-2017-11343
Blocks:
  Show dependency tree
 
Reported: 2016-08-16 09:25 UTC by Agostino Sarubbo
Modified: 2018-06-11 15:08 UTC (History)
5 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-08-16 09:25:20 UTC
From ${URL} :

I would like to request a CVE for a buffer overrun that
was detected in CHICKEN Scheme's "process-execute" and
"process-spawn" procedures from the posix unit.

CHICKEN preallocated an argument array of ARG_MAX items (or 256 if
that was undefined), and an environment array of ENV_MAX items
(or 1024 if that was undefined), and did not verify that the arguments
or environment lists were less than this size, resulting in a buffer
overrun if these lists were longer.

The full announcement can be found here:
http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html

The bugfix also fixed a memory leak in the same piece of code, which
could potentially be used to cause resource exhaustion/denial of
service situation.  Does this warrant another CVE?

The bug affects all releases of CHICKEN up to and including 4.11.



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 erik falor 2016-08-19 04:37:11 UTC
CVE-2016-6830 and CVE-2016-6831 have been assigned to the aforementioned issues.
Comment 2 Thomas Deutschmann gentoo-dev Security 2016-08-21 14:10:08 UTC
Like said in comment #1, CVEs were assigned: http://www.openwall.com/lists/oss-security/2016/08/18/2
Comment 3 Thomas Deutschmann gentoo-dev Security 2016-11-18 19:40:43 UTC
v4.11.1 is available. From http://code.call-cc.org/dev-snapshots/2016/09/12/NEWS:

> 4.11.1
> 
> - Security fixes
>   - CVE-2016-6830: Fix buffer overrun due to excessively long argument
>     or environment lists in process-execute and process-spawn (#1308).
>     This also removes unnecessary limitations on the length of
>     these lists (thanks to Vasilij Schneidermann).
>   - CVE-2016-6831: Fix memory leak in process-execute and
>     process-spawn.  If, during argument and environment list
>     processing, a list item isn't a string, an exception is thrown,
>     in which case previously malloc()ed strings weren't freed.
> 
> [...]
Comment 4 Maxim Koltsov gentoo-dev 2018-03-15 20:39:46 UTC
I've added chicken-4.13, which fixed all CVEs:

https://code.call-cc.org/releases/4.13.0/NEWS
Comment 5 Aaron Bauman Gentoo Infrastructure gentoo-dev Security 2018-06-11 15:08:37 UTC
tree is clean.

GLSA Vote: No