Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6831

Опубликовано: 10 янв. 2017
Источник: debian
EPSS Низкий

Описание

The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
chickenfixed4.12.0-0.2package
chickenno-dsastretchpackage
chickenno-dsajessiepackage

Примечания

  • Fixed in the same upstream patch which is provided for CVE-2016-6830

EPSS

Процентиль: 67%
0.00536
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

CVSS3: 7.5
nvd
около 9 лет назад

The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

CVSS3: 7.5
github
больше 3 лет назад

The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).

EPSS

Процентиль: 67%
0.00536
Низкий