CVE-2017-9334

Priority
Description
An incorrect "pair?" check in the Scheme "length" procedure results in an
unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13,
which allows an attacker to cause a denial of service by passing an
improper list to an application that calls "length" on it.
Notes
Package
Upstream:released (4.12.0-0.2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (4.12.0-0.3)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (4.12.0-0.3)
Ubuntu 20.10 (Groovy Gorilla):not-affected (4.12.0-0.3)
More Information

Updated: 2020-07-28 18:47:28 UTC (commit 7b6828437fde0509248708fcdb5b0f7587b85bd1)