Summary: | <dev-scheme/chicken-4.13.0-r1: Unchecked size argument in malloc() in CHICKEN Scheme (CVE-2017-6949) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ewfalor, maksbotan, proxy-maint, scheme |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1433278 | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 620320, 625392 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2017-03-17 14:15:03 UTC
CVE-2017-6949 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6949): An issue was discovered in CHICKEN Scheme through 4.12.0. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact may have been a segfault or buffer overflow. I've added chicken-4.13, which fixed all CVEs: https://code.call-cc.org/releases/4.13.0/NEWS tree is clean. GLSA Vote: No |