An incorrect "pair?" check in the Scheme "length" procedure results in an unsafe pointer dereference in all CHICKEN Scheme versions prior to 4.13, which allows an attacker to cause a denial of service by passing an improper list to an application that calls "length" on it.
http://lists.nongnu.org/archive/html/chicken-hackers/2017-05/msg00099.html
http://lists.nongnu.org/archive/html/chicken-announce/2017-05/msg00000.html