Debian: DSA-1992-1: New chrony packages fix denial of service

    Date04 Feb 2010
    CategoryDebian
    31
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in chrony, a pair of programs which are used to maintain the accuracy of the system clock on a computer. This issues are similar to the NTP security flaw CVE-2009-3563. The Common Vulnerabilities and Exposures project identifies the following problems:
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA-1992-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                                 Nico Golde
    February 4th, 2010                      http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : chrony
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    Debian bug     : none
    CVE ID         : CVE-2010-0292 CVE-2010-0293 CVE-2010-0294
    
    Several vulnerabilities have been discovered in chrony, a pair of programs
    which are used to maintain the accuracy of the system clock on a computer.
    This issues are similar to the NTP security flaw CVE-2009-3563.  The Common
    Vulnerabilities and Exposures project identifies the following problems:
    
    CVE-2010-0292
    
      chronyd replies to all cmdmon packets with NOHOSTACCESS messages even for
      unauthorized hosts.  An attacker can abuse this behaviour to force two
      chronyd instances to play packet ping-pong by sending such a packet with
      spoofed source address and port.  This results in high CPU and network
      usage and thus denial of service conditions.
    
    CVE-2010-0293
    
      The client logging facility of chronyd doesn't limit memory that is used
      to store client information.  An attacker can cause chronyd to allocate
      large amounts of memory by sending NTP or cmdmon packets with spoofed
      source addresses resulting in memory exhaustion.
    
    CVE-2010-0294
    
      chronyd lacks of a rate limit control to the syslog facility when logging
      received packets from unauthorized hosts.  This allows an attacker to
      cause denial of service conditions via filling up the logs and thus disk
      space by repeatedly sending invalid cmdmon packets.
    
    
    For the oldstable distribution (etch), this problem has been fixed in
    version 1.21z-5+etch1.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 1.23-6+lenny1.
    
    For the testing (squeeze) and unstable (sid) distribution, this problem
    will be fixed soon.
    
    
    We recommend that you upgrade your chrony packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Debian (oldstable)
    - ------------------
    
    Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z.orig.tar.gz
        Size/MD5 checksum:   310709 84f76a73dff5a3c9e9f11f3c29a4e93b
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1.dsc
        Size/MD5 checksum:      629 41c78c176d00f2034298f0f91d9dcc7e
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1.diff.gz
        Size/MD5 checksum:   157657 aef816a20684f142795441c9d0c2c39a
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_alpha.deb
        Size/MD5 checksum:   354606 9c8d999fe33d00f7a2c7582b265ab1e8
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_amd64.deb
        Size/MD5 checksum:   337452 d87cea1f14f0834d91540f6125f53de9
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_arm.deb
        Size/MD5 checksum:   335840 06b572cf16b4331c6af3eadd62054de6
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_hppa.deb
        Size/MD5 checksum:   341488 919e32d2603bf6503be5f051b9a0111f
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_i386.deb
        Size/MD5 checksum:   328578 f5ba5a2a8e08fe6978704cea5874b222
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_ia64.deb
        Size/MD5 checksum:   383552 c904705550097e5f94305517fe83b422
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_mipsel.deb
        Size/MD5 checksum:   355940 12845d0599bef378d006f790776a4c79
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_powerpc.deb
        Size/MD5 checksum:   338000 ee2d8986bb062f6dc88ed4cd1e57966a
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_s390.deb
        Size/MD5 checksum:   335212 fb9f62d0eea41f68b5a67d0c961a8045
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.21z-5+etch1_sparc.deb
        Size/MD5 checksum:   327336 872180a40677910e8010ec313eab73a8
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Debian (stable)
    - ---------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1.dsc
        Size/MD5 checksum:     1014 20987586fe342a0b48ebe8432f7ab9ef
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23.orig.tar.gz
        Size/MD5 checksum:   321015 ffce77695e55d8efda19ab0b78309c23
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1.diff.gz
        Size/MD5 checksum:   162829 a6d0c6c4d06b22630b00361f0c0e0e37
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_alpha.deb
        Size/MD5 checksum:   350622 cc8748f4e26828a481397c76d4b7178b
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_amd64.deb
        Size/MD5 checksum:   334714 8cdc4b9808d7eb84a901359959bd43d9
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_arm.deb
        Size/MD5 checksum:   332124 347fff466b0a11a3824f983421e4c6ad
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_armel.deb
        Size/MD5 checksum:   336222 2e8bd1a63adb1df9577f796d010e1112
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_hppa.deb
        Size/MD5 checksum:   338322 2639b0c0f98608e244bde3714bd801ae
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_i386.deb
        Size/MD5 checksum:   321778 ea5ef26c6b52ea7a1a506fae23b2a5ec
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_ia64.deb
        Size/MD5 checksum:   379862 9c3dd5b2b24ce43b2dc06d652e1802ad
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_mips.deb
        Size/MD5 checksum:   340162 c50add8cb3986c4e7b6478545aecd1c9
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_mipsel.deb
        Size/MD5 checksum:   348290 c17da54e6c6a2b66dd0fab961fdc00a1
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_powerpc.deb
        Size/MD5 checksum:   336384 8c06d057cb248e80c5de06d399dc8581
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_s390.deb
        Size/MD5 checksum:   333040 9e3cb73f7c58ff093d8e0407430af6ce
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/c/chrony/chrony_1.23-6+lenny1_sparc.deb
        Size/MD5 checksum:   325458 0f9b64665e974fc06a6e976100516d7f
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.