An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.12.0-0.3", "binary_name": "chicken-bin" }, { "binary_version": "4.12.0-0.3", "binary_name": "chicken-bin-dbgsym" }, { "binary_version": "4.12.0-0.3", "binary_name": "libchicken-dev" }, { "binary_version": "4.12.0-0.3", "binary_name": "libchicken8" }, { "binary_version": "4.12.0-0.3", "binary_name": "libchicken8-dbgsym" } ] }