UBUNTU-CVE-2016-6831

Source
https://ubuntu.com/security/CVE-2016-6831
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-6831.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2016-6831
Related
Published
2017-01-10T15:59:00Z
Modified
2025-01-13T10:21:15Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

References

Affected packages

Ubuntu:Pro:16.04:LTS / chicken

Package

Name
chicken
Purl
pkg:deb/ubuntu/chicken@4.9.0.1-1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.9.0.1-1

Ecosystem specific

{
    "ubuntu_priority": "low"
}