First published: Thu Apr 16 2015(Updated: )
chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =7.0 | |
Chrony | <=1.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1822 has a medium severity level as it can lead to denial of service or arbitrary code execution.
To fix CVE-2015-1822, update Chrony to version 1.31.1 or later.
CVE-2015-1822 affects remote authenticated users on Debian Linux 7.0 and Chrony versions up to 1.31.
CVE-2015-1822 can be exploited through unacknowledged replies to command requests leading to daemon crashes.
Yes, CVE-2015-1822 may allow remote authenticated users to execute arbitrary code under certain conditions.