Security issues fixed in chrony 1.31.1

Bug #1443945 reported by Matt Johnston
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
chrony (Debian)
Fix Released
Unknown
chrony (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

chrony-1.31.1 fixes three security issues.

CVE-2015-1853: DoS attack on authenticated symmetric NTP associations
CVE-2015-1821: Heap-based buffer overflow in access configuration
CVE-2015-1822: Use of uninitialized pointer in command processing

Debian have patches 1.30-2 and 1.24-3.1+deb7u3 which are probably applicable to Ubuntu versions

CVE References

Matt Johnston (matt-ucc)
summary: - CVE-2015-1821 Heap out of bound write in address filter
+ Security issues fixed in chrony 1.31.1
Changed in chrony (Debian):
status: Unknown → Fix Released
Matt Johnston (matt-ucc)
information type: Private Security → Public
Revision history for this message
Seth Arnold (seth-arnold) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

Changed in chrony (Ubuntu):
status: New → Incomplete
Revision history for this message
Christian Ehrhardt  (paelzer) wrote :

Even in universe, fixed since Xenial by the usual pickup of changes for the next releases

Changed in chrony (Ubuntu):
status: Incomplete → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.