CVE-2016-6830

Priority
Description
The "process-execute" and "process-spawn" procedures in CHICKEN Scheme used
fixed-size buffers for holding the arguments and environment variables to
use in its execve() call. This would allow user-supplied
argument/environment variable lists to trigger a buffer overrun. This
affects all releases of CHICKEN up to and including 4.11 (it will be fixed
in 4.12 and 5.0, which are not yet released).
Notes
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [4.7.0-1+deb7u1build0.12.04.1])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (4.12.0-0.1)
Ubuntu 19.10 (Eoan Ermine):not-affected (4.12.0-0.1)
Ubuntu 20.04 (Focal Fossa):not-affected (4.12.0-0.1)
Patches:
Upstream:http://lists.nongnu.org/archive/html/chicken-hackers/2016-07/txtSWHYeFeG0R.txt
More Information

Updated: 2020-04-24 03:33:09 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)