SB2015041607 - Input validation error in Debian Linux
Published: April 16, 2015 Updated: August 9, 2020
Security Bulletin ID
SB2015041607
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2015-1822)
The vulnerability allows a remote #AU# to read and manipulate data.
chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests.
Remediation
Install update from vendor's website.
References
- http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html
- http://www.debian.org/security/2015/dsa-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73956
- https://security.gentoo.org/glsa/201507-01