[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Chicken-users] [Chicken-announce] [SECURITY] Buffer overrun in proc
From: |
Peter Bex |
Subject: |
Re: [Chicken-users] [Chicken-announce] [SECURITY] Buffer overrun in process-execute and process-spawn |
Date: |
Fri, 19 Aug 2016 20:40:19 +0200 |
User-agent: |
Mutt/1.5.23 (2014-03-12) |
On Fri, Aug 12, 2016 at 08:54:19AM +0200, Peter Bex wrote:
> A buffer overflow error was found in the POSIX unit's procedures
> process-execute and process-spawn (bug #1308).
This bug has been assigned CVE-2016-6830.
> Additionally, a memory leak existed in this code, which would be
> triggered when an error is raised during argument and environment
> processing (e.g., if one of the arguments wasn't a string).
This bug has been assigned CVE-2016-6831.
Regards,
The CHICKEN Team
signature.asc
Description: Digital signature