Security issues fixed in chrony 1.31.1
Bug #1443945 reported by
Matt Johnston
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
chrony (Debian) |
Fix Released
|
Unknown
|
|||
chrony (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
chrony-1.31.1 fixes three security issues.
CVE-2015-1853: DoS attack on authenticated symmetric NTP associations
CVE-2015-1821: Heap-based buffer overflow in access configuration
CVE-2015-1822: Use of uninitialized pointer in command processing
Debian have patches 1.30-2 and 1.24-3.1+deb7u3 which are probably applicable to Ubuntu versions
summary: |
- CVE-2015-1821 Heap out of bound write in address filter + Security issues fixed in chrony 1.31.1 |
Changed in chrony (Debian): | |
status: | Unknown → Fix Released |
information type: | Private Security → Public |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res