Your submission was sent successfully! Close

CVE-2016-6831

Published: 10 January 2017

The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
chicken
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 21.10 (Impish Indri) Not vulnerable
(4.12.0-0.1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(4.12.0-0.1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(4.12.0-0.1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(4.12.0-0.1)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)