An issue was discovered in CHICKEN Scheme through. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact may have been a segfault or buffer overflow.
Created chicken tracking bugs for this issue:
Affects: epel-all [bug 1433279]
Affects: fedora-all [bug 1433280]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.