[PATCH] gnu: chicken: Update to 4.12.0.

  • Done
  • quality assurance status badge
Details
2 participants
  • Kei Kebreau
  • Leo Famulari
Owner
unassigned
Submitted by
Kei Kebreau
Severity
normal

Debbugs page

Kei Kebreau wrote 8 years ago
(address . guix-patches@gnu.org)(name . Kei Kebreau)(address . kei@openmailbox.org)
20170321185756.5871-1-kei@openmailbox.org
* gnu/packages/scheme.scm (chicken): Update to 4.12.0.
---
gnu/packages/scheme.scm | 16 +++-------------
1 file changed, 3 insertions(+), 13 deletions(-)

Toggle diff (41 lines)
diff --git a/gnu/packages/scheme.scm b/gnu/packages/scheme.scm
index e1dba9bed..b55d682ad 100644
--- a/gnu/packages/scheme.scm
+++ b/gnu/packages/scheme.scm
@@ -325,18 +325,14 @@ mashups, office (web agendas, mail clients, ...), etc.")
(define-public chicken
(package
(name "chicken")
- (version "4.11.1")
+ (version "4.12.0")
(source (origin
(method url-fetch)
- (uri (string-append "http://code.call-cc.org/releases/"
+ (uri (string-append "https://code.call-cc.org/releases/"
version "/chicken-" version ".tar.gz"))
- (uri (string-append "http://code.call-cc.org/dev-snapshots/"
- "2016/09/12/chicken-" version ".tar.gz"))
(sha256
(base32
- "1rwymbbmnwdyhdzilv9w75an989xw9kjf3x52iqdng3nphpflcga"))
- (patches
- (search-patches "chicken-CVE-2016-6830+CVE-2016-6831.patch"))))
+ "12b9gaa9lqh39lj1v4wm48f6z8ww3jdkvc5bh9gqqvn6kd2wwnk0"))))
(build-system gnu-build-system)
(arguments
`(#:modules ((guix build gnu-build-system)
@@ -359,12 +355,6 @@ mashups, office (web agendas, mail clients, ...), etc.")
;; Parallel builds are not supported, as noted in README.
#:parallel-build? #f))
- ;; One of the tests ("testing direct invocation can detect calls of too
- ;; many arguments...") times out when building with a more recent GCC.
- ;; The problem was reported here:
- ;; https://lists.gnu.org/archive/html/chicken-hackers/2015-04/msg00059.html
- (native-inputs
- `(("gcc" ,gcc-4.8)))
(home-page "http://www.call-cc.org/")
(synopsis "R5RS Scheme implementation that compiles native code via C")
(description
--
2.12.0
Leo Famulari wrote 8 years ago
(name . Kei Kebreau)(address . kei@openmailbox.org)(address . 26209@debbugs.gnu.org)
20170321190720.GA31804@jasmine
On Tue, Mar 21, 2017 at 02:57:56PM -0400, Kei Kebreau wrote:
Toggle quote (2 lines)
> * gnu/packages/scheme.scm (chicken): Update to 4.12.0.

-----BEGIN PGP SIGNATURE-----
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=e1n8
-----END PGP SIGNATURE-----


Kei Kebreau wrote 8 years ago
[PATCH] gnu: chicken: Update to 4.12.0.
(name . Kei Kebreau)(address . kei@openmailbox.org)
20170321205135.10637-1-kei@openmailbox.org
* gnu/packages/scheme.scm (chicken): Update to 4.12.0.
---
.../chicken-CVE-2016-6830+CVE-2016-6831.patch | 81 -------------
gnu/packages/patches/chicken-CVE-2017-6949.patch | 132 +++++++++++++++++++++
gnu/packages/scheme.scm | 16 +--
3 files changed, 136 insertions(+), 93 deletions(-)
delete mode 100644 gnu/packages/patches/chicken-CVE-2016-6830+CVE-2016-6831.patch
create mode 100644 gnu/packages/patches/chicken-CVE-2017-6949.patch

Toggle diff (267 lines)
diff --git a/gnu/packages/patches/chicken-CVE-2016-6830+CVE-2016-6831.patch b/gnu/packages/patches/chicken-CVE-2016-6830+CVE-2016-6831.patch
deleted file mode 100644
index 59decde0e..000000000
--- a/gnu/packages/patches/chicken-CVE-2016-6830+CVE-2016-6831.patch
+++ /dev/null
@@ -1,81 +0,0 @@
-diff -ur a/irregex-core.scm b/irregex-core.scm
---- a/irregex-core.scm 2016-09-11 19:03:00.000000000 -0400
-+++ b/irregex-core.scm 2017-01-01 22:24:08.000000000 -0500
-@@ -30,6 +30,8 @@
-
- ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
- ;;;; History
-+;; 0.9.6: 2016/12/05 - fixed exponential memory use of + in compilation
-+;; of backtracking matcher.
- ;; 0.9.5: 2016/09/10 - fixed a bug in irregex-fold handling of bow
- ;; 0.9.4: 2015/12/14 - performance improvement for {n,m} matches
- ;; 0.9.3: 2014/07/01 - R7RS library
-@@ -3170,16 +3172,7 @@
- ((sre-empty? (sre-sequence (cdr sre)))
- (error "invalid sre: empty *" sre))
- (else
-- (letrec
-- ((body
-- (lp (sre-sequence (cdr sre))
-- n
-- flags
-- (lambda (cnk init src str i end matches fail)
-- (body cnk init src str i end matches
-- (lambda ()
-- (next cnk init src str i end matches fail)
-- ))))))
-+ (let ((body (rec (list '+ (sre-sequence (cdr sre))))))
- (lambda (cnk init src str i end matches fail)
- (body cnk init src str i end matches
- (lambda ()
-@@ -3204,10 +3197,21 @@
- (lambda ()
- (body cnk init src str i end matches fail))))))))
- ((+)
-- (lp (sre-sequence (cdr sre))
-- n
-- flags
-- (rec (list '* (sre-sequence (cdr sre))))))
-+ (cond
-+ ((sre-empty? (sre-sequence (cdr sre)))
-+ (error "invalid sre: empty +" sre))
-+ (else
-+ (letrec
-+ ((body
-+ (lp (sre-sequence (cdr sre))
-+ n
-+ flags
-+ (lambda (cnk init src str i end matches fail)
-+ (body cnk init src str i end matches
-+ (lambda ()
-+ (next cnk init src str i end matches fail)
-+ ))))))
-+ body))))
- ((=)
- (rec `(** ,(cadr sre) ,(cadr sre) ,@(cddr sre))))
- ((>=)
-diff -ur a/irregex-utils.scm b/irregex-utils.scm
---- a/irregex-utils.scm 2016-09-11 19:03:00.000000000 -0400
-+++ b/irregex-utils.scm 2017-01-01 22:25:25.000000000 -0500
-@@ -89,7 +89,7 @@
- (case (car x)
- ((: seq)
- (cond
-- ((and (pair? (cddr x)) (pair? (cddr x)) (not (eq? x obj)))
-+ ((and (pair? (cdr x)) (pair? (cddr x)) (not (eq? x obj)))
- (display "(?:" out) (for-each lp (cdr x)) (display ")" out))
- (else (for-each lp (cdr x)))))
- ((submatch)
-diff -ur "a/manual-html/Unit irregex.html" "b/manual-html/Unit irregex.html"
---- "a/manual-html/Unit irregex.html" 2016-09-11 19:10:47.000000000 -0400
-+++ "b/manual-html/Unit irregex.html" 2017-01-01 22:26:05.000000000 -0500
-@@ -353,6 +353,6 @@
- <dd class="defsig"><p>Returns an optimized SRE matching any of the literal strings in the list, like Emacs' <tt>regexp-opt</tt>. Note this optimization doesn't help when irregex is able to build a DFA.</p></dd>
- </dl>
- <h5 id="sec:sre-.3estring"><a href="#sec:sre-.3estring">sre-&gt;string</a></h5><dl class="defsig"><dt class="defsig" id="def:sre-.3estring"><span class="sig"><tt>(sre-&gt;string &lt;sre&gt;)</tt></span> <span class="type">procedure</span></dt>
--<dd class="defsig"><p>Convert an SRE to a POSIX-style regular expression string, if possible.</p></dd>
-+<dd class="defsig"><p>Convert an SRE to a PCRE-style regular expression string, if possible.</p></dd>
- </dl>
--<hr /><p>Previous: <a href="Unit%20extras.html">Unit extras</a></p><p>Next: <a href="Unit%20srfi-1.html">Unit srfi-1</a></p></div></div></body>
-\ No newline at end of file
-+<hr /><p>Previous: <a href="Unit%20extras.html">Unit extras</a></p><p>Next: <a href="Unit%20srfi-1.html">Unit srfi-1</a></p></div></div></body>
diff --git a/gnu/packages/patches/chicken-CVE-2017-6949.patch b/gnu/packages/patches/chicken-CVE-2017-6949.patch
new file mode 100644
index 000000000..00552eec7
--- /dev/null
+++ b/gnu/packages/patches/chicken-CVE-2017-6949.patch
@@ -0,0 +1,132 @@
+From: LemonBoy <thatlemon@gmail.com>
+Date: Fri, 10 Mar 2017 16:29:47 +0100
+Subject: [PATCH] Add bound checking to all srfi-4 vector allocations.
+
+Do what C_allocate_vector already does and prevent the creation of a
+vector that's too big or too small.
+We should be very careful to avoid the latter case because the
+allocation size is directly fed into `malloc' as 'x + sizeof(C_header)'
+thus making possible to successfully allocate a vector smaller than the
+C_header structure and get C_block_header_init to write over
+uninitialized memory.
+
+To reduce code duplication, type checking is moved from each of the
+make-*vector procedures to the common "alloc" helper procedure.
+
+Signed-off-by: Peter Bex <peter@more-magic.net>
+Signed-off-by: Kooda <kooda@upyum.com>
+---
+ srfi-4.scm | 34 +++++++++++++++-------------------
+ 1 file changed, 15 insertions(+), 19 deletions(-)
+
+diff --git a/srfi-4.scm b/srfi-4.scm
+index 7f5412b..69f58ba 100644
+--- a/srfi-4.scm
++++ b/srfi-4.scm
+@@ -255,24 +255,28 @@ EOF
+
+ ;;; Basic constructors:
+
+-(let* ([ext-alloc
+- (foreign-lambda* scheme-object ([int bytes])
+- "C_word *buf = (C_word *)C_malloc(bytes + sizeof(C_header));"
++(let* ((ext-alloc
++ (foreign-lambda* scheme-object ((size_t bytes))
++ "C_word *buf;"
++ "if (bytes > C_HEADER_SIZE_MASK) C_return(C_SCHEME_FALSE);"
++ "buf = (C_word *)C_malloc(bytes + sizeof(C_header));"
+ "if(buf == NULL) C_return(C_SCHEME_FALSE);"
+ "C_block_header_init(buf, C_make_header(C_BYTEVECTOR_TYPE, bytes));"
+- "C_return(buf);") ]
+- [ext-free
+- (foreign-lambda* void ([scheme-object bv])
+- "C_free((void *)C_block_item(bv, 1));") ]
+- [alloc
++ "C_return(buf);") )
++ (ext-free
++ (foreign-lambda* void ((scheme-object bv))
++ "C_free((void *)C_block_item(bv, 1));") )
++ (alloc
+ (lambda (loc len ext?)
++ (##sys#check-exact len loc)
++ (when (fx< len 0) (##sys#error loc "size is negative" len))
+ (if ext?
+- (let ([bv (ext-alloc len)])
++ (let ((bv (ext-alloc len)))
+ (or bv
+ (##sys#error loc "not enough memory - cannot allocate external number vector" len)) )
+- (let ([bv (##sys#allocate-vector len #t #f #t)]) ; this could be made better...
++ (let ((bv (##sys#allocate-vector len #t #f #t))) ; this could be made better...
+ (##core#inline "C_string_to_bytevector" bv)
+- bv) ) ) ] )
++ bv) ) ) ) )
+
+ (set! release-number-vector
+ (lambda (v)
+@@ -282,7 +286,6 @@ EOF
+
+ (set! make-u8vector
+ (lambda (len #!optional (init #f) (ext? #f) (fin? #t))
+- (##sys#check-exact len 'make-u8vector)
+ (let ((v (##sys#make-structure 'u8vector (alloc 'make-u8vector len ext?))))
+ (when (and ext? fin?) (set-finalizer! v ext-free))
+ (if (not init)
+@@ -295,7 +298,6 @@ EOF
+
+ (set! make-s8vector
+ (lambda (len #!optional (init #f) (ext? #f) (fin? #t))
+- (##sys#check-exact len 'make-s8vector)
+ (let ((v (##sys#make-structure 's8vector (alloc 'make-s8vector len ext?))))
+ (when (and ext? fin?) (set-finalizer! v ext-free))
+ (if (not init)
+@@ -308,7 +310,6 @@ EOF
+
+ (set! make-u16vector
+ (lambda (len #!optional (init #f) (ext? #f) (fin? #t))
+- (##sys#check-exact len 'make-u16vector)
+ (let ((v (##sys#make-structure 'u16vector (alloc 'make-u16vector (##core#inline "C_fixnum_shift_left" len 1) ext?))))
+ (when (and ext? fin?) (set-finalizer! v ext-free))
+ (if (not init)
+@@ -321,7 +322,6 @@ EOF
+
+ (set! make-s16vector
+ (lambda (len #!optional (init #f) (ext? #f) (fin? #t))
+- (##sys#check-exact len 'make-s16vector)
+ (let ((v (##sys#make-structure 's16vector (alloc 'make-s16vector (##core#inline "C_fixnum_shift_left" len 1) ext?))))
+ (when (and ext? fin?) (set-finalizer! v ext-free))
+ (if (not init)
+@@ -334,7 +334,6 @@ EOF
+
+ (set! make-u32vector
+ (lambda (len #!optional (init #f) (ext? #f) (fin? #t))
+- (##sys#check-exact len 'make-u32vector)
+ (let ((v (##sys#make-structure 'u32vector (alloc 'make-u32vector (##core#inline "C_fixnum_shift_left" len 2) ext?))))
+ (when (and ext? fin?) (set-finalizer! v ext-free))
+ (if (not init)
+@@ -347,7 +346,6 @@ EOF
+
+ (set! make-s32vector
+ (lambda (len #!optional (init #f) (ext? #f) (fin? #t))
+- (##sys#check-exact len 'make-s32vector)
+ (let ((v (##sys#make-structure 's32vector (alloc 'make-s32vector (##core#inline "C_fixnum_shift_left" len 2) ext?))))
+ (when (and ext? fin?) (set-finalizer! v ext-free))
+ (if (not init)
+@@ -360,7 +358,6 @@ EOF
+
+ (set! make-f32vector
+ (lambda (len #!optional (init #f) (ext? #f) (fin? #t))
+- (##sys#check-exact len 'make-f32vector)
+ (let ((v (##sys#make-structure 'f32vector (alloc 'make-f32vector (##core#inline "C_fixnum_shift_left" len 2) ext?))))
+ (when (and ext? fin?) (set-finalizer! v ext-free))
+ (if (not init)
+@@ -375,7 +372,6 @@ EOF
+
+ (set! make-f64vector
+ (lambda (len #!optional (init #f) (ext? #f) (fin? #t))
+- (##sys#check-exact len 'make-f64vector)
+ (let ((v (##sys#make-structure
+ 'f64vector
+ (alloc 'make-f64vector (##core#inline "C_fixnum_shift_left" len 3) ext?))))
+--
+2.1.4
+
diff --git a/gnu/packages/scheme.scm b/gnu/packages/scheme.scm
index e1dba9bed..fec872f5f 100644
--- a/gnu/packages/scheme.scm
+++ b/gnu/packages/scheme.scm
@@ -325,18 +325,16 @@ mashups, office (web agendas, mail clients, ...), etc.")
(define-public chicken
(package
(name "chicken")
- (version "4.11.1")
+ (version "4.12.0")
(source (origin
(method url-fetch)
- (uri (string-append "http://code.call-cc.org/releases/"
+ (uri (string-append "https://code.call-cc.org/releases/"
version "/chicken-" version ".tar.gz"))
- (uri (string-append "http://code.call-cc.org/dev-snapshots/"
- "2016/09/12/chicken-" version ".tar.gz"))
(sha256
(base32
- "1rwymbbmnwdyhdzilv9w75an989xw9kjf3x52iqdng3nphpflcga"))
+ "12b9gaa9lqh39lj1v4wm48f6z8ww3jdkvc5bh9gqqvn6kd2wwnk0"))
(patches
- (search-patches "chicken-CVE-2016-6830+CVE-2016-6831.patch"))))
+ (search-patches "chicken-CVE-2017-6949.patch"))))
(build-system gnu-build-system)
(arguments
`(#:modules ((guix build gnu-build-system)
@@ -359,12 +357,6 @@ mashups, office (web agendas, mail clients, ...), etc.")
;; Parallel builds are not supported, as noted in README.
#:parallel-build? #f))
- ;; One of the tests ("testing direct invocation can detect calls of too
- ;; many arguments...") times out when building with a more recent GCC.
- ;; The problem was reported here:
- ;; https://lists.gnu.org/archive/html/chicken-hackers/2015-04/msg00059.html
- (native-inputs
- `(("gcc" ,gcc-4.8)))
(home-page "http://www.call-cc.org/")
(synopsis "R5RS Scheme implementation that compiles native code via C")
(description
--
2.12.0
Kei Kebreau wrote 8 years ago
(name . Leo Famulari)(address . leo@famulari.name)(address . 26209@debbugs.gnu.org)
878tny4ak9.fsf@openmailbox.org
Leo Famulari <leo@famulari.name> writes:

Toggle quote (8 lines)
> On Tue, Mar 21, 2017 at 02:57:56PM -0400, Kei Kebreau wrote:
>> * gnu/packages/scheme.scm (chicken): Update to 4.12.0.
>
> Can you try cherry-picking the upstream fix for CVE-2017-6949?
>
> http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.html
> http://seclists.org/oss-sec/2017/q1/634

Yes. Please check the new patch.
-----BEGIN PGP SIGNATURE-----
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=uLN2
-----END PGP SIGNATURE-----

Leo Famulari wrote 8 years ago
(name . Kei Kebreau)(address . kei@openmailbox.org)(address . 26209@debbugs.gnu.org)
20170322175004.GA16011@jasmine
On Tue, Mar 21, 2017 at 04:51:35PM -0400, Kei Kebreau wrote:
Toggle quote (6 lines)
> * gnu/packages/scheme.scm (chicken): Update to 4.12.0.
> ---
> .../chicken-CVE-2016-6830+CVE-2016-6831.patch | 81 -------------
> gnu/packages/patches/chicken-CVE-2017-6949.patch | 132 +++++++++++++++++++++
> gnu/packages/scheme.scm | 16 +--

Remember to update 'gnu/local.mk'. Otherwise LGTM
-----BEGIN PGP SIGNATURE-----
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=QMX7
-----END PGP SIGNATURE-----


Kei Kebreau wrote 8 years ago
(name . Leo Famulari)(address . leo@famulari.name)(address . 26209-done@debbugs.gnu.org)
87zigd2jmc.fsf@openmailbox.org
Leo Famulari <leo@famulari.name> writes:

Toggle quote (9 lines)
> On Tue, Mar 21, 2017 at 04:51:35PM -0400, Kei Kebreau wrote:
>> * gnu/packages/scheme.scm (chicken): Update to 4.12.0.
>> ---
>> .../chicken-CVE-2016-6830+CVE-2016-6831.patch | 81 -------------
>> gnu/packages/patches/chicken-CVE-2017-6949.patch | 132 +++++++++++++++++++++
>> gnu/packages/scheme.scm | 16 +--
>
> Remember to update 'gnu/local.mk'. Otherwise LGTM

Thanks for the reminder. Pushed to master as
359e9c4215c624a3fa7235096b49902238ce7864.
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEg7ZwOtzKO2lLzi2m5qXuPBlGeg0FAljS0SwACgkQ5qXuPBlG
eg2tdw//SQyx5j6egTVk1DsHjheNDP0M8suNlf/Whqc2SddqASCwNZT0QSHF8A5U
jmbcSmGQAhp26Xo4z/WABTkkDkVmyt9q7MxvZniLELFDrlTDvnkVa4EgYiWJizmz
3IPluRVPfIiuzpyU/GNjJmMj6MNAv6Xr+b6scjSroit8k0AAX8baFUlCh+kP8XRi
FOvbyHC5+ENot9+fAbSYuEcKp4lOtBS4Z79wfzXCkxnl/64DZbVExVeEnTPtg1wC
Z9bSyPWiKw7OnxhIVjZiO2goxKb2bQzoGbI/B/szbb+yiqdZtJ0vVNXjUCtrJHqh
cdeqK1T1nCPPVQ5h0X3cw9YpAI5l3VQ1K0Om6t+SzaWakRQ+0+IdmEXlf5hZlOYY
G16SFNNHAIc/KB8MiVOKCYR9kv8lql9ki74dmsBOuq7fMULVfYi15VZo4qAepibr
PGbDNNgaOJoC9/U8WGAoGNLjnWuy5l0OPHPFI3TUdqmk1QRrNt5BrSuFops8T0wv
zJfzeQp5tKlzZ148YOyqwBwizEGyzDF7m8BCHnDVTkwzd5VEDMLyOckHOJ7StBVK
rcReyuoRwrgPVwGmnjnCHwMe56yWFw/8zDPE6/mQjRAKLYZFaPJCKs9YHeX/MRDS
iRW9dmnGhmbR416AVe8ldm0kROT+9k89bUPG3jpoCbDCz5b2a5s=
=S2t5
-----END PGP SIGNATURE-----

Closed
?
Your comment

This issue is archived.

To comment on this conversation send an email to 26209@debbugs.gnu.org

To respond to this issue using the mumi CLI, first switch to it
mumi current 26209
Then, you may apply the latest patchset in this issue (with sign off)
mumi am -- -s
Or, compose a reply to this issue
mumi compose
Or, send patches to this issue
mumi send-email *.patch
You may also tag this issue. See list of standard tags. For example, to set the confirmed and easy tags
mumi command -t +confirmed -t +easy
Or, remove the moreinfo tag and set the help tag
mumi command -t -moreinfo -t +help