Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201612-54 ] Chicken: Multiple vulnerabilities
Date: Sat, 31 Dec 2016 15:24:38
Message-Id: e401f3e3-e353-27cf-3860-e88aa5d62056@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201612-54
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Chicken: Multiple vulnerabilities
9 Date: December 31, 2016
10 Bugs: #467966, #486350, #510712, #536448, #552202
11 ID: 201612-54
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in Chicken, the worst of which
19 allows remote attackers to execute arbitrary code.
20
21 Background
22 ==========
23
24 Chicken is a scheme interpreter and native scheme to C compiler.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 dev-scheme/chicken < 4.10.0-r1 >= 4.10.0-r1
33
34 Description
35 ===========
36
37 Multiple vulnerabilities have been discovered in Chicken. Please review
38 the CVE identifiers referenced below for details.
39
40 Impact
41 ======
42
43 A remote attacker could possibly execute arbitrary code with the
44 privileges of the process, or cause a Denial of Service condition.
45
46 Workaround
47 ==========
48
49 There is no known workaround at this time.
50
51 Resolution
52 ==========
53
54 All Chicken users should upgrade to the latest version:
55
56 # emerge --sync
57 # emerge --ask --oneshot --verbose ">=dev-scheme/chicken-4.10.0-r1"
58
59 References
60 ==========
61
62 [ 1 ] CVE-2013-2024
63 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2024
64 [ 2 ] CVE-2013-4385
65 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4385
66 [ 3 ] CVE-2014-3776
67 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3776
68 [ 4 ] CVE-2014-9651
69 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9651
70 [ 5 ] CVE-2015-4556
71 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4556
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 https://security.gentoo.org/glsa/201612-54
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users' machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 https://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2016 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature