Описание
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 4.12.0-0.3 |
| cosmic | not-affected | 4.12.0-0.3 |
| devel | not-affected | 4.12.0-0.3 |
| disco | not-affected | 4.12.0-0.3 |
| eoan | not-affected | 4.12.0-0.3 |
| esm-apps/bionic | not-affected | 4.12.0-0.3 |
| esm-apps/focal | not-affected | 4.12.0-0.3 |
| esm-apps/jammy | not-affected | 4.12.0-0.3 |
| esm-apps/noble | not-affected | 4.12.0-0.3 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
An incorrect "pair?" check in the Scheme "length" procedure results in ...
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3