call-cc CHICKEN 4.12.0 Release Candidate 1

CPE Details

call-cc CHICKEN 4.12.0 Release Candidate 1
4.12.0
2019-06-18
11h19 +00:00
2019-06-18
11h19 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:call-cc:chicken:4.12.0:rc1:*:*:*:*:*:*

Informations

Vendor

call-cc

Product

chicken

Version

4.12.0

Update

rc1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2017-11343 2017-07-16 19h00 +00:00 Due to an incomplete fix for CVE-2012-6125, all versions of CHICKEN Scheme up to and including 4.12.0 are vulnerable to an algorithmic complexity attack. An attacker can provide crafted input which, when inserted into the symbol table, will result in O(n) lookup time.
7.5
Haute
CVE-2017-9334 2017-06-01 02h53 +00:00 An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
7.5
Haute
CVE-2017-6949 2017-03-16 16h00 +00:00 An issue was discovered in CHICKEN Scheme through 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact may have been a segfault or buffer overflow.
8.1
Haute