CVE-2017-6949

NameCVE-2017-6949
DescriptionAn issue was discovered in CHICKEN Scheme through 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact may have been a segfault or buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-908-1
Debian Bugs858057

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
chicken (PTS)buster4.13.0-1fixed
bullseye5.2.0-2fixed
bookworm5.3.0-1fixed
sid, trixie5.3.0-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
chickensourcewheezy4.7.0-1+deb7u2DLA-908-1
chickensource(unstable)4.12.0-0.2858057

Notes

[stretch] - chicken <no-dsa> (Minor issue)
[jessie] - chicken <no-dsa> (Minor issue)
http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.html

Search for package or bug name: Reporting problems