Source: chrony
Version: 1.30-1
Severity: grave
Tags: security upstream patch fixed-upstream



*** /tmp/chrony.reportbug
Package: chrony
Severity: FILLINSEVERITY
Tags: security

Hi,

the following vulnerabilities were published for chrony. Note, that I
choosed severity grave, since two CVEs seem to potentially be
exploited to execute arbitrary code and chronyd is running as root.
Please lower the severity if you don't agree (I don't know chrony very
well):

CVE-2015-1821[0]:
Heap out of bound write in address filter

CVE-2015-1822[1]:
uninitialized pointer in cmdmon reply slots

CVE-2015-1853[2]:
authentication doesn't protect symmetric associations against DoS attacks

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-1821
[1] https://security-tracker.debian.org/tracker/CVE-2015-1822
[2] https://security-tracker.debian.org/tracker/CVE-2015-1853

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to