MGASA-2015-0163

Source
https://advisories.mageia.org/MGASA-2015-0163.html
Import Source
https://advisories.mageia.org/MGASA-2015-0163.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0163
Related
Published
2015-04-23T21:14:25Z
Modified
2015-04-23T21:02:43Z
Summary
Updated chrony packages fix security vulnerabilities
Details

Updated chrony package fixes security vulnerabilities:

Using particular address/subnet pairs when configuring access control would cause an invalid memory write. This could allow attackers to cause a denial of service (crash) or execute arbitrary code (CVE-2015-1821).

When allocating memory to save unacknowledged replies to authenticated command requests, a pointer would be left uninitialized, which could trigger an invalid memory write. This could allow attackers to cause a denial of service (crash) or execute arbitrary code (CVE-2015-1822).

When peering with other NTP hosts using authenticated symmetric association, the internal state variables would be updated before the MAC of the NTP messages was validated. This could allow a remote attacker to cause a denial of service by impeding synchronization between NTP peers (CVE-2015-1853).

References
Credits

Affected packages

Mageia:4 / chrony

Package

Name
chrony
Purl
pkg:rpm/mageia/chrony?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.29.1-1.1.mga4

Ecosystem specific

{
    "section": "core"
}