Fedora 20: chicken Security Update

    Date07 Apr 2015
    CategoryFedora
    129
    Posted ByLinuxSecurity Advisories
    Patches security vulnerability discussed here: https://bugzilla.redhat.com/show_bug.cgi?id=1181483 Latest upstream release. Latest upstream release.
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-0633
    2015-01-14 06:26:14
    --------------------------------------------------------------------------------
    
    Name        : chicken
    Product     : Fedora 20
    Version     : 4.9.0.1
    Release     : 3.fc20
    URL         : http://call-cc.org
    Summary     : A practical and portable Scheme system
    Description :
    CHICKEN is a compiler for the Scheme programming language.
    CHICKEN produces portable, efficient C, supports almost all of the R5RS
    Scheme language standard, and includes many enhancements and extensions.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Patches security vulnerability discussed here:
    https://bugzilla.redhat.com/show_bug.cgi?id=1181483
    Latest upstream release.
    Latest upstream release.
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Tue Jan 13 2015 Ricky Elrod  - 4.9.0.1-3
    - Apply patch to work around buffer overrun:
      https://bugzilla.redhat.com/show_bug.cgi?id=1181483
    * Sat Aug 16 2014 Fedora Release Engineering  - 4.9.0.1-2
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
    * Thu Aug  7 2014 Ricky Elrod  - 4.9.0.1-1
    - Latest upstream release.
    * Sat Jun  7 2014 Ricky Elrod  - 4.9.0-4
    - Rebuild from previous bootstrap.
    * Sat Jun  7 2014 Ricky Elrod  - 4.9.0-3
    - Bootstrap for el7.
    * Sat Jun  7 2014 Fedora Release Engineering  - 4.9.0-2
    - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
    * Wed Jun  4 2014 Ricky Elrod  - 4.9.0-1
    - Latest upstream release.
    * Tue May 20 2014 Ricky Elrod  - 4.8.0.6-2
    - Patch for CVE-2014-3776.
    * Thu Apr 24 2014 Ricky Elrod  - 4.8.0.6-1
    - Upstream 4.8.0.6.
    * Sat Dec 14 2013 Ricky Elrod  - 4.8.0.5-3
    - Get rid of docs subpackage.
    - Add a -libs subpackage for the runtime library.
    * Sun Dec  8 2013 Ricky Elrod  - 4.8.0.5-2
    - Add -Wformat for BZ #1037013.
    * Sun Nov 24 2013 Ricky Elrod  - 4.8.0.5-1
    - Upstream 4.8.0.5.
    * Fri Sep 27 2013 Ricky Elrod  - 4.8.0.4-4
    - Add upstream patch for CVE-2013-4385, until 4.8.0.5 is released.
      http://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git;a=commitdiff;h=cd1b9775005ebe220ba11265dbf5396142e65f26
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1181483 - chicken: buffer overflow vulnerability in CHICKEN Scheme's substring-index[-ci] procedures
            https://bugzilla.redhat.com/show_bug.cgi?id=1181483
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update chicken' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.