Summary
Florian Weimer discovered two security problems in the Chrony time synchronisation software (buffer overflows and use of uninitialised data in command replies).
Solution
For the oldstable distribution (squeeze), these problems will be fixed soon in 1.24-3+squeeze1 (due to a technical restriction in the archive processing scripts the two updates cannot be released together).
For the stable distribution (wheezy), these problems have been fixed in version 1.24-3.1+deb7u2.
For the unstable distribution (sid), these problems will be fixed soon.
We recommend that you upgrade your chrony packages.
Insight
It consists of a pair of programs :
`chronyd'. This is a daemon which runs in background on the system. It obtains measurements (e.g. via the network) of the system's offset relative to other systems, and adjusts the system time accordingly. For isolated systems, the user can periodically enter the correct time by hand (using `chronyc'). In either case, `chronyd' determines the rate at which the computer gains or loses time, and compensates for this. Chronyd implements the NTP protocol and can act as either a client or a server.
`chronyc'. This is a command-line driven control and monitoring program.
An administrator can use this to fine-tune various parameters within the daemon, add or delete servers etc whilst the daemon is running.
Affected
chrony on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-4502, CVE-2012-4503 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities