Source: chicken Version: 4.9.0.1-1 Severity: important Tags: upstream patch security
Hi, the following vulnerability was published for chicken. CVE-2017-6949[0]: | An issue was discovered in CHICKEN Scheme through 4.12.0. When using a | nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in | unmanaged memory, the vector size would be used in unsanitised form as | an argument to malloc(). With an unexpected size, the impact may have | been a segfault or buffer overflow. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-6949 [1] http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.html Regards, Salvatore _______________________________________________ Secure-testing-team mailing list [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

