Bug 1369108 (CVE-2016-6830, CVE-2016-6831) - CVE-2016-6830 CVE-2016-6831 chicken: Buffer overflow and a memory leak in the POSIX unit's procedures process-execute and process-spawn
Summary: CVE-2016-6830 CVE-2016-6831 chicken: Buffer overflow and a memory leak in the...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2016-6830, CVE-2016-6831
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1369109 1369110
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-08-22 13:48 UTC by Andrej Nemec
Modified: 2019-09-29 13:55 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-08-24 10:21:46 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2016-08-22 13:48:16 UTC
A buffer overflow error was found in the POSIX unit's procedures
process-execute and process-spawn.  The code allocated a buffer
of size ARG_MAX for the argument array, and ENV_MAX for the
environment array, then copied the strings from the input lists
into that buffer *without* checking the length of the lists.

On modern Linuxen, ARG_MAX and ENV_MAX are both undefined, which
exacerbated the problem: CHICKEN would fall back to 256 for ARG_MAX
and 1024 for ENV_MAX when these were undefined.

Additionally, a memory leak existed in this code, which would be
triggered when an error is raised during argument and environment
processing (e.g., if one of the arguments wasn't a string).

References:

http://seclists.org/oss-sec/2016/q3/276

Comment 1 Andrej Nemec 2016-08-22 13:48:48 UTC
Created chicken tracking bugs for this issue:

Affects: fedora-all [bug 1369109]
Affects: epel-all [bug 1369110]

Comment 2 Rick Elrod 2016-08-24 10:21:46 UTC
Fix is in testing.


Note You need to log in before you can comment on or make changes to this bug.