You are here
Home > Preporuke > Ranjivost programskog paketa chicken

Ranjivost programskog paketa chicken

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-6553
2014-05-21 22:39:26
——————————————————————————–

Name : chicken
Product : Fedora 19
Version : 4.8.0.6
Release : 2.fc19
URL : http://call-cc.org
Summary : A practical and portable Scheme system
Description :
CHICKEN is a compiler for the Scheme programming language.
CHICKEN produces portable, efficient C, supports almost all of the R5RS
Scheme language standard, and includes many enhancements and extensions.

——————————————————————————–
Update Information:

Fix for CVE-2014-3776 and bump to 4.8.0.6.
Latest upstream release.
——————————————————————————–
ChangeLog:

* Tue May 20 2014 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.6-2
– Patch for CVE-2014-3776.
* Thu Apr 24 2014 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.6-1
– Upstream 4.8.0.6.
* Sat Dec 14 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.5-3
– Get rid of docs subpackage.
– Add a -libs subpackage for the runtime library.
* Sun Dec 8 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.5-2
– Add -Wformat for BZ #1037013.
* Sun Nov 24 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.5-1
– Upstream 4.8.0.5.
* Fri Sep 27 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.4-4
– Add upstream patch for CVE-2013-4385, until 4.8.0.5 is released.
http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commitdiff;h=cd1b9775005ebe220ba11265dbf5396142e65f26
* Mon Sep 2 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.4-3
– Nuke -Wall from optflags.
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 4.8.0.4-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Wed Jul 17 2013 Ricky Elrod <codeblock@fedoraproject.org> 4.8.0.4-1
– Upstream 4.8.0.4.
——————————————————————————–
References:

[ 1 ] Bug #1099613 – CVE-2014-3776 chicken: buffer overflow in “read-u8vector!” procedure leads to DoS or arbitrary code exec
https://bugzilla.redhat.com/show_bug.cgi?id=1099613
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update chicken’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-6551
2014-05-21 22:39:18
——————————————————————————–

Name : chicken
Product : Fedora 20
Version : 4.8.0.6
Release : 2.fc20
URL : http://call-cc.org
Summary : A practical and portable Scheme system
Description :
CHICKEN is a compiler for the Scheme programming language.
CHICKEN produces portable, efficient C, supports almost all of the R5RS
Scheme language standard, and includes many enhancements and extensions.

——————————————————————————–
Update Information:

Fix for CVE-2014-3776.
——————————————————————————–
ChangeLog:

* Tue May 20 2014 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.6-2
– Patch for CVE-2014-3776.
* Thu Apr 24 2014 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.6-1
– Upstream 4.8.0.6.
* Sat Dec 14 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.5-3
– Get rid of docs subpackage.
– Add a -libs subpackage for the runtime library.
* Sun Dec 8 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.5-2
– Add -Wformat for BZ #1037013.
* Sun Nov 24 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.5-1
– Upstream 4.8.0.5.
* Fri Sep 27 2013 Ricky Elrod <codeblock@fedoraproject.org> – 4.8.0.4-4
– Add upstream patch for CVE-2013-4385, until 4.8.0.5 is released.
http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commitdiff;h=cd1b9775005ebe220ba11265dbf5396142e65f26
——————————————————————————–
References:

[ 1 ] Bug #1099613 – CVE-2014-3776 chicken: buffer overflow in “read-u8vector!” procedure leads to DoS or arbitrary code exec
https://bugzilla.redhat.com/show_bug.cgi?id=1099613
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update chicken’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorTomislav Protega
Cert idNCERT-REF-2014-08-0028-ADV
CveCVE-2014-3776 CVE-2013-4385
ID izvornikaFEDORA-2014-6553 FEDORA-2014-6551
Proizvodchicken
Izvorhttp://www.redhat.com
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa mod_security

Otkriveni su sigurnosni nedostaci u programskom paketu mod_security. Otkriveni nedostaci potencijalnim napadačima omogućuju zaobilaženje sigurnosnih pravila, izvođenje napada uskraćivanjem usluge...

Close