chrony: CVE-2014-0021: traffic amplification in cmdmon protocol

Related Vulnerabilities: CVE-2014-0021  

Debian Bug report logs - #737644
chrony: CVE-2014-0021: traffic amplification in cmdmon protocol

version graph

Package: chrony; Maintainer for chrony is Vincent Blut <vincent.debian@free.fr>; Source for chrony is src:chrony (PTS, buildd, popcon).

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Tue, 4 Feb 2014 16:12:01 UTC

Severity: important

Tags: fixed-upstream, security, upstream

Fixed in version chrony/1.29.1-1

Done: Joachim Wiedorn <ad_debian@joonet.de>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Joachim Wiedorn <ad_debian@joonet.de>:
Bug#737644; Package chrony. (Tue, 04 Feb 2014 16:12:06 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Joachim Wiedorn <ad_debian@joonet.de>. (Tue, 04 Feb 2014 16:12:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: chrony: CVE-2014-0021: traffic amplification in cmdmon protocol
Date: Tue, 04 Feb 2014 17:09:32 +0100
Package: chrony
Severity: important
Tags: security upstream fixed-upstream

Hi,

the following vulnerability was published for chrony.

This is fixed upstream in 1.19.1 by modify chronyc protocol. New
version will support both (old and new).

CVE-2014-0021[0]:
traffic amplification in cmdmon protocol

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0021
    http://security-tracker.debian.org/tracker/CVE-2014-0021
[1] http://chrony.tuxfamily.org/News.html

Regards,
Salvatore



Reply sent to Joachim Wiedorn <ad_debian@joonet.de>:
You have taken responsibility. (Mon, 10 Feb 2014 17:51:11 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Mon, 10 Feb 2014 17:51:11 GMT) (full text, mbox, link).


Message #10 received at 737644-close@bugs.debian.org (full text, mbox, reply):

From: Joachim Wiedorn <ad_debian@joonet.de>
To: 737644-close@bugs.debian.org
Subject: Bug#737644: fixed in chrony 1.29.1-1
Date: Mon, 10 Feb 2014 17:48:19 +0000
Source: chrony
Source-Version: 1.29.1-1

We believe that the bug you reported is fixed in the latest version of
chrony, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 737644@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joachim Wiedorn <ad_debian@joonet.de> (supplier of updated chrony package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 06 Feb 2014 15:51:47 +0100
Source: chrony
Binary: chrony
Architecture: source amd64
Version: 1.29.1-1
Distribution: unstable
Urgency: high
Maintainer: Joachim Wiedorn <ad_debian@joonet.de>
Changed-By: Joachim Wiedorn <ad_debian@joonet.de>
Description: 
 chrony     - Set the computer clock from time servers on the Net
Closes: 737644
Changes: 
 chrony (1.29.1-1) unstable; urgency=high
 .
   * New upstream release with bugfix:
     - Closes: #737644: Fixing vulnerability:
         CVE-2014-0021 - traffic amplification in cmdmon protocol
         (incompatible with previous protocol version, but chronyc
         supports both).
Checksums-Sha1: 
 45eff660e89098f0df2cefd6947981fbb6dc2241 1564 chrony_1.29.1-1.dsc
 bf07c0afa6ab761d9863714497555fa5be578f3d 392889 chrony_1.29.1.orig.tar.gz
 121e4609b16f397617926815a11c4f4ac2d99d0e 18902 chrony_1.29.1-1.debian.tar.gz
 7971702476f69938131451ccd2fd0ee8160bcc4c 240342 chrony_1.29.1-1_amd64.deb
Checksums-Sha256: 
 032b6eba540b485567a0d920b5e3c1f484d34bf2efbb4b81d83f53b658985857 1564 chrony_1.29.1-1.dsc
 658c9bb4d8c8d8ec7d0908429aa266e5f8413ba86bd4acbfd2f9669f6065af27 392889 chrony_1.29.1.orig.tar.gz
 d9d72d46c97d90367c50ffec246db667e4499c2c5dcc2148fd3933c4b98c3c7e 18902 chrony_1.29.1-1.debian.tar.gz
 37be1aa5be7e681f668f0ad84048dc2c0e17fc450720c96ce37e4f6171d7d0ed 240342 chrony_1.29.1-1_amd64.deb
Files: 
 309cab60dfb937d2fde90b07aa2a3892 1564 admin extra chrony_1.29.1-1.dsc
 9d49eadac5eb49daec8cc3d92a869b0c 392889 admin extra chrony_1.29.1.orig.tar.gz
 22380129990986edea63fd73d3f5f7ce 18902 admin extra chrony_1.29.1-1.debian.tar.gz
 e1091f594849de79bb8acc5211d03451 240342 admin extra chrony_1.29.1-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJS9mh9AAoJEJxcmesFvXUKhUYIALSieSPYwwFj2HEjL44k7X+9
IWgS6TreWG+ZH/CM+lqV/POfVOTS+X9Jdf+hsNjPd1otylJqg2diYjHHNA7hY5E/
VPmdOF07oY4THbS1PSNOg91N6wkVV7I9z6+9yoVp3iNr+o8bI+rOPR44mAOUZw+G
XJm8FJMYE6Sw69mLSjQEmT0FlSh4tSmsw7GrV1v2qTdhWjilbQtHnanVByryZPIs
azMTvlzn5sx+G2t4YQvW55zSVsBqWTOzLobzmI7sooi9YAIDONTrtHaKsnPwS5vz
d2333FuCTRHNbPJbQbncQV7SvQXF2dtf3LZzVoYBYM8ck6I+m7ekFEArJk8wu/M=
=CBdq
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 13 Mar 2014 07:30:46 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 19:00:29 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.