ALT-PU-2015-2089-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-1821
Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder.
- [chrony-announce] 20150407 chrony-1.31.1 released (security)
- [chrony-announce] 20150407 chrony-1.31.1 released (security)
- DSA-3222
- DSA-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 73955
- 73955
- GLSA-201507-01
- GLSA-201507-01
Modified: 2024-11-21
CVE-2015-1822
chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests.
- [chrony-announce] 20150407 chrony-1.31.1 released (security)
- [chrony-announce] 20150407 chrony-1.31.1 released (security)
- DSA-3222
- DSA-3222
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 73956
- 73956
- GLSA-201507-01
- GLSA-201507-01
Modified: 2024-11-21
CVE-2015-1853
chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in crafted NTP data packets.