DEBIAN-CVE-2010-0292

Source
https://security-tracker.debian.org/tracker/CVE-2010-0292
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2010-0292.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2010-0292
Upstream
Published
2010-02-08T20:30:00.657Z
Modified
2025-11-19T01:06:24.685378Z
Summary
[none]
Details

The readfromcmd_socket function in cmdmon.c in chronyd in Chrony before 1.23.1, and 1.24-pre1, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a spoofed cmdmon packet that triggers a continuous exchange of NOHOSTACCESS messages between two daemons, a related issue to CVE-2009-3563.

References

Affected packages

Debian:11 / chrony

Package

Name
chrony
Purl
pkg:deb/debian/chrony?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.23-7

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / chrony

Package

Name
chrony
Purl
pkg:deb/debian/chrony?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.23-7

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / chrony

Package

Name
chrony
Purl
pkg:deb/debian/chrony?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.23-7

Ecosystem specific

{
    "urgency": "medium"
}

Debian:14 / chrony

Package

Name
chrony
Purl
pkg:deb/debian/chrony?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.23-7

Ecosystem specific

{
    "urgency": "medium"
}