Hide Forgot
An issue was discovered in CHICKEN Scheme through. When using a nonstandard CHICKEN-specific extension to allocate an SRFI-4 vector in unmanaged memory, the vector size would be used in unsanitised form as an argument to malloc(). With an unexpected size, the impact may have been a segfault or buffer overflow. References: http://seclists.org/oss-sec/2017/q1/627 http://lists.gnu.org/archive/html/chicken-announce/2017-03/msg00000.html
Created chicken tracking bugs for this issue: Affects: epel-all [bug 1433279] Affects: fedora-all [bug 1433280]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.