The "process-execute" and "process-spawn" procedures did not free memory correctly when the execve() call failed, resulting in a memory leak. This could be abused by an attacker to cause resource exhaustion or a denial of service. This affects all releases of CHICKEN up to and including 4.11 (it will be fixed in 4.12 and 5.0, which are not yet released).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/92550 | Third Party Advisory VDB Entry |
http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html | Patch Vendor Advisory |
Configurations
Information
Published : 2017-01-10 07:59
Updated : 2017-01-10 18:55
NVD link : CVE-2016-6831
Mitre link : CVE-2016-6831
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
call-cc
- chicken