First published: Tue Apr 03 2018(Updated: )
remctld in remctl before 3.14, when an attacker is authorized to execute a command that uses the sudo option, has a use-after-free that leads to a daemon crash, memory corruption, or arbitrary command execution.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eyrie Remctl | <3.14 | |
Debian Debian Linux | =9.0 | |
debian/remctl | 3.15-1 3.17-1 3.18-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.