Download
| Alert*
oval:org.secpod.oval:def:1800060
An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. Fixed In Version: chicken ... oval:org.secpod.oval:def:1800869 An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. Fixed In Version:¶ ch ... oval:org.secpod.oval:def:1900421 An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all chicken-bin Scheme versions prior to 4.13,which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. oval:org.secpod.oval:def:2001404 An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it. |