Описание
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| chicken | fixed | 4.12.0-0.2 | package | |
| chicken | no-dsa | stretch | package | |
| chicken | no-dsa | jessie | package | |
| chicken | no-dsa | wheezy | package |
Примечания
Original announcement: http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html
Patch: http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html
Связанные уязвимости
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.